Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] safe computing, hints for SAFER sandbox Sarbanes-Oxley Act Family Educational Rights and Privacy Act (FERPA) satellite 2nd Schmidt, Hans-Thilo Schoch, John script kiddies 2nd scripting scripts 2nd secrecy 2nd secret key Secure Hash Standard (SHS) Secure Telephone Unit (STU-III) project security administration security administrator functions Security Assertion Markup Language (SAML) security audit security classification, comparing with subject's security clearance security consultants international Security Controls for Computer Systems Security Features User's Guide (SFUG) security kernel security label syntax security model security policy 2nd administrative security overall planning and administration establishing and maintaining multilevel self/group/public controls semaphore system sensitivity labels 2nd separation of duties 2nd SERPENT server key server-side attacks web server-side scripts languages Service Provisioning Markup Language (SPML) servlets session session keys shadow password files Shamir, Adi SHARK shell scripts Shockwave Rider, The SI-CERT signaling equipment signature-writing pattern Simple Mail Transfer Protocol (SMTP) 2nd simple security condition SingCERT (Singapore CERT) single key single-level device SKIPJACK Slovenian Computer Emergency Response Team smart cards 2nd smart keys smashing the stack sniffers 2nd Softwar: La Guerre Douce software security tools software vulnerabilities source suppression Spafford, Gene spam spoofing 2nd spread spectrum systems Spring Joint Computer Conference of 1967 spyware SQUARE standardization cryptography emanations star property state two-digit numeric codes stealth Steinauer, Dennis Stoll, Cliff subject sensitivity label substitution ciphers 2nd summarizes suspicious user activity switching systems symmetric key system access system access controls system administration system administrator/operator functions system design |