| < Day Day Up > |
|
Languages, programming and execution, 284-285, 297-298
assembly language, 284-285
binary code, 285
high-level language, 285, 293
machine language, 284, 292
Laptops, 234, 238
Lattice-Based Access Control (LBAC), 31, 47-48
Laws, 323, 325, 327, 328
administrative law, 302, 320
civil law, 302, 320, 327
computer-related laws, 304-305
copyrights, 303
criminal law, 302, 320
1974 Federal Privacy Act, 304
1984 First Computer Security Act, 304
1986 Computer Fraud and Abuse Act, 304
1987 Computer Security Act, 304-305
1994 Computer Abuse Amendments Act, 305
1994 US Communications Assistance for Law Enforcement Act, 305
1996 US Economic and Protection of Proprietary Information, 305
1999 Gramm-Leach-Bliley Law, 305, 319, 328
patents, 303
trademarks, 302-303
trade secrets, 303-304, 319, 323
US Patriot Act, 307, 319, 325
Layers and layering as systems security, 287
LBAC (Lattice-Based Access Control), 31, 47-48
LDAP (Lightweight Directory Access Protocol), 76-77, 83, 90, 261
Leaks, confidential information, 62
Leased-line speeds, 136
LFNs (long file names), 68-69
Linear bus topology, 98-99
LINUX, 332-333, 348-351, 353, 360
Load balancing, 210
Local DoS, 44
Local penetration programs, 44
Local Security Access (LSA), 219-220
Location, physical security issues, 197
Logical access controls, 33
Logical security controls, 49-50
Logic bombs, 254, 291, 327, 334-335, 352, 357
Logs and logging, 41-42, 231-232
application activity, 263
Long file names (LFNs), 68-69, 90-91
Lophtcrack (Lopht Heavy Industries), 35, 39
LSA (Local Security Access), 219-220
| < Day Day Up > |
|