F


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

face verification, biometric authentication
Faces software prototype
     design
     formative evaluation
     halting/resuming disclosure
fact-based questions, challenge questions systems
fail-safe defaults, configurations violating
Fair Information Practices (FIP), Code of
fake
     answers, challenge questions systems
     password prompts
familiarity, trust and
file access
     permissions
     special privileges, Netscape Navigator
file allocation table
files
     APPEL preference, importing with Privacy Bird
     deleting
         securely
     organizing in Chameleon
     overwriting, Save As command
     policy reference (P3P)
     sanitizing
     sharing unintentionally
         KaZaA network
     shredding, user-created rules for
     unlink( ) function, changing semantics of
filesystems, security of, Chameleon 2nd
fingerprint verification, biometric authentication
FIP (Fair Information Practice), Code of
FIPS (Federal Information Processing Standards)
     passwords
FIPS (Federal Information Processing Standards), Code of
     passwords
firewalls, ZoneAlarm
FIRST (Forum of Incident Response and Security Teams)
fixed answers/questions, challenge questions systems 2nd
Flechais, Ivan
focus groups, identifying user/stakeholder/customer concerns
forensic tools
forged messages
FORMAT command (Windows)
Forum of Incident Response and Security Teams (FIRST)
Freenet network
freeware
Friendster web site, user-controlled information flow
FTA (failure to acquire)
     biometric usability
     keystroke biometrics
FTE (failure to enroll)
     biometric usability
     keystroke biometrics



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net