Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] label integrity labeling human-readable output labels, sensitivity LaMacchia, Brian LAN security LANs LaPadula, Leonard 2nd Lavender Book Law Enforcement Access Field (LEAF) Layer Two Tunneling Protocol (L2TP) layers Leahy, Patrick LEAP protocol least permissive principle Leeper, Ed legislation and mandates balancing act Computer Fraud and Abuse Act Computer Security Act of 1987 recent initiatives leukemia, risks for life-cycle assurance 2nd lightning Lightweight Directory Access Protocol (LDAP) 2nd link encryption 2nd Local area networks Local Multipoint Distribution Service (LMDS) locks and keys active tokens challenge-response systems cryptographic locks equipment locks hints for keeping intruders out smart cards smart keys tokens types of locks logging into system logic bombs logical addresses login processes biometrics Challenge Handshake Authentication Protocol (CHAP) Kerberos mutual authentication one-time password (OTP) Password Authentication Protocol (PAP) per-session authentication Radius DIAMETER remote access (TACACS and RADIUS) tokens LOKI97 |