P



Index


[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

packet filtering
Packet Internet Groper (ping) requests
packet sniffers
packet-switched networks
Packeteer
packets
parental controls 2nd
passive intrusion protection systems
passports, Internet
patches
Patriot Act
pattern matching
peer-to-peer networks 2nd
personal firewalls
personal information, collecting via websites
personal security
     airport security
         airport scanners
         airport terrorist tracking systems
         Computer Assisted Passenger Prescreening System (CAPPSII) 2nd
     biometrics
         fingerprint IDs
         iris scanning
     black market credit card money trail
     cell phones
         bluebugging
         bluesnarfing
         cell phone cloners
         cell phone snoopers
         Paris Hilton case study
         viruses
     Combined DNA Identification System (CODIS)
         dangers of DNA profiling
         gel electrophoresis
         restriction fragment length polymorphism (RFLP)
     credit cards
         black market credit card money trail
         credit card fraud, detecting
         identity theft
         theft of credit card information
     data mining
         classification
         cleaning data
         dangers of
         neural networks
         regression
     DNA matching
     government surveillance
         FBI Carnivore system
         NSA Echelon system
         Patriot Act
     identity theft
         credit card theft
         credit repair scams
         criminal uses for stolen identities
         mail theft
         phishing scams
         protecting against
     lie detectors 2nd
     location tracking
         cell phones
         handsets
         receivers
         satellites
     radio frequency identification (RFID)
         RFID readers
         RFID tags
         tracking personal information with
     wiretapping
         illegal wiretapping
         legal wiretapping
     workplace surveillance
         badges/ID tags
         cell phones
         closed-circuit cameras
         continuous, systematic surveillance
         GPSs (global positioning systems)
         Internet use
         statistics
         wiretapping
pests (instant messaging)
phishing 2nd 3rd 4th
     phishing emails
     protecting against
     scams
phone calls, tapping [See also electronic surveillance.]
     illegal wiretapping
     legal wiretapping
PI (pulse induction)
piconets
PICS (Platform for Internet Content Selection)
ping (Packet Internet Groper) requests
Platform for Internet Content Selection (PICS)
pneumographs
polygraphs 2nd
polymorphic spyware
pop-up killers
port probes
ports, Internet
privacy issues
     cryptosystems
     electronic surveillance
         FBI Carnivore system
         NSA Echelon system
         Patriot Act
     Google
     identity theft
         credit card theft
         credit repair scams
         criminal uses for stolen identities
         mail theft
         phishing scams
         protecting against
     Internet passports
     lie detectors 2nd
     RFID (radio frequency identification)
         RFID readers
         RFID tags
         tracking personal information with
     spyware
     VPNs (virtual private networks)
     websites
         cookies
         personal profiles
         sniffers 2nd
         user activity, tracking
         web bugs 2nd
     wiretapping
         illegal wiretapping
         legal wiretapping
private keys 2nd
probe request frames (Wi-Fi)
Prolexic
protocols
     IP (Internet Protocol)
     TCP (Transmission Control Protocol)
     TCP/IP
proxy servers 2nd
public keys
public-key cryptography
pulse induction (PI)



How Personal & Internet Security Work
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net