W



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

V.A. (Veterans Administration)
Validation
Validation errors
Value of data
Value of security [See Economics of cybersecurity.]
VAM (Vulnerability Assessment and Mitigation) 2nd
Vandalism
Varian, Hal
Vendor interests
Verifying program code [See Testing code.]
Verisign 2nd 3rd
Vernam cipher
Vernam, Gilbert
Version proliferation, databases
Views, multilevel databases
Vignère tableau 2nd
Virtual machines
Virtual memory
Virtual private networks (VPNs)
Virtualization
Virus scanners
Viruses [See also Malicious code.]
     appended to a program
     application programs
     attachment
     benign
     boot sector
     bootstrapping
     Brain
     Code Red
     cookies
     defense methods
     definition
     document
     e-mail attachment
     effects and causes
     gaining control
     homes for 2nd
     in read-only files
     infecting hardware
     integrated
     Internet worm
     libraries
     memory-resident
     misconceptions
     one-time execution
     platform limitations
     qualities of
     resident
     signatures
         definition
         execution patterns
         polymorphism
         scanners
         storage patterns
         transmission patterns
     source of
     spreading media
     surrounding a program
     surviving power off
     transient
     triggering
     web bugs
Voice recognition authentication [See Biometrics.]
VoIP (Voice over IP)
Voting, electronic
VPNs (virtual private networks)
Vulnerabilities [See also Attacks ; specific vulnerabilities.]
     data
     definition
     hardware
     laptop computers
     mapping to controls
     network threat 2nd
     risk analysis
     software
     versus threats
Vulnerability Assessment and Mitigation (VAM) 2nd




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net