index_L

 


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

Lagging attacks
Law enforcement. [See legal issues.]
Laws. [See legal issues.]
Legal attache (LEGAT)
Legal issues. [See also moral issues, social issues.]
     18 U.S.C. §1030 (a)(6) (Trafficking in Passwords)
     18 U.S.C. §1030 (Computer Fraud and Abuse Act)
     18 U.S.C. §1030(a)(3) (Trespassing on Government Computers)
     18 U.S.C. §2510 (Wiretap Statute)
     access, legal definition
    Active Network Defense. [See Active Network Defense (AND).]
     APIG (All Party Internet Group)
     applicable laws
     CERT/CC, reporting to
     chain of custody
     civil law 2nd
     class action suits
     computer data, as property
     criminal culpability
     criminal law 2nd
    damages
         aggregating
         cost-estimation model
         estimating
         hidden costs
         ICAMP (Incident Cost Analysis and Modeling Project)
         IRC (Internet Relay Chat)
         loss, definition 2nd
         trigger for federal statutes
         United States v. Middleton
     Department of Justice Cybercrime Web site
     domestic
     dual criminality
     electronic communication privacy
     EURIM (European Information Society Group)
     evidence collection
     extortion
     extradition
     frequency of legal involvement
     health care
     identifying perpetrators
     impairing access to data
     incident response procedures
     initiating legal proceedings
     international, current
     international, trends
     involving legal authorities
     jurisdictional issues
     LEGAT (legal attache)
     letters rogatory
     liability
     military responses
     MLATs (mutual legal assistance treaties)
     national defense
     NIPC (National Infrastructure Protection Center), reporting to
     PCCIP (President's Commission on Critical Infrastructure Protection)
     phone contacts
     prognosis
     record keeping
     reporting requirements
     reporting suspected crimes 2nd
     self-help options
     Tortious Interference with Business Relationship or Expectancy
     Trafficking in Passwords (18 U.S.C. §1030(a)(6))
     trespassing on government computers
     U.S. legal system
     U.S. Secret Service, Electronic Crimes Branch, reporting to
     unauthorized, legal definition
     viability of prosecution
     victim negligence
     victim profile
     wiretaps
LEGAT (legal attache)
Legislation
     CMA (Computer Misuse Act) (United Kingdom)
     Computer Fraud and Abuse Act (18 U.S.C. §1030)
     Graham-Leach-Bliley Act
     HIPAA (Health Insurance Portability and Accountability Act)
     "Privacy Law" (Italy)
     United States v. Dennis 2nd
     USA PATRIOT Act of 2001
     Wiretap Statute (18 U.S.C. §2510)
Legitimate traffic. [See service differentiation.]
Letters rogatory
Liability issues 2nd [See also legal issues.]
libcap format
Lion (1i0n) worm
Litigation. [See legal issues.]
Locality principle
Loki
Loss estimates. [See cost of attacks, damages.]
Loss, legal definition
Loveless, Mark (Simple Nomad) 2nd
lsof

 


Internet Denial of Service. Attack and Defense Mechanisms
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net