L



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

label integrity
labeling human-readable output
labels, sensitivity
LaMacchia, Brian
LAN security
LANs
LaPadula, Leonard 2nd
Lavender Book
Law Enforcement Access Field (LEAF)
Layer Two Tunneling Protocol (L2TP)
layers
Leahy, Patrick
LEAP protocol
least permissive principle
Leeper, Ed
legislation and mandates
     balancing act
     Computer Fraud and Abuse Act
     Computer Security Act of 1987
     recent initiatives
leukemia, risks for
life-cycle assurance 2nd
lightning
Lightweight Directory Access Protocol (LDAP) 2nd
link encryption 2nd
Local area networks
Local Multipoint Distribution Service (LMDS)
locks and keys
     active tokens
     challenge-response systems
     cryptographic locks
     equipment locks
     hints for keeping intruders out
     smart cards
     smart keys
     tokens
     types of locks
logging into system
logic bombs
logical addresses
login processes
     biometrics
     Challenge Handshake Authentication Protocol (CHAP)
     Kerberos
     mutual authentication
     one-time password (OTP)
     Password Authentication Protocol (PAP)
     per-session authentication
     Radius DIAMETER
     remote access (TACACS and RADIUS)
     tokens
LOKI97




Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net