| < Day Day Up > |
|
C2 systems, 292
C2W (See Command and Control Warfare)
C2W strategies, 292
Cadillac, 443
California-based Institute for Historical Review, 329
California Institute of Technology, 460
call counting, 540–41
Caltarian security service, 588
Campaign for Radical Truth in History, 327
Campaign for the Defense of Legitimate Rights (CDLR), 327–28
Canadian government, 417
CareGroup Healthcare System, 545
Carnegie Mellon University, 174, 230
Carnivore, 448–51, 472
case histories: con men, 21–22
case histories: disk-recovery, 114–17
Case Study One: The Case of the Flying Laptop, 24
Case Study Two: The Case of the Burned Tapes, 24
Caucasus Web war, 245
CCRibber, 408
CDB Infotek, 531
CD-ROMs, 209–11
Cell-Loc Inc., 471
cellular digital packet data (CDPD), 485
cellular handsets distribution, 542
Cellular One, 535
cellular service providers, 535–36
Cellular Telecommunications Industry Association (CTIA), 472, 538
Center for Advanced Aviation Systems Development (CAASD), 493–94
Center for Strategic and International Studies (CSIS), 350
Centers for Disease Control and Prevention, 343
Centrax, 3.0 software, 587
CentraxICE, 587
CERT Advisory CA-1992-19, 155
CERT Coordination Center security incident reports, 584
CERT(r) Coordination Center (CERT/CC), 174–75
Certificate of Completion, 38, 170, 83
Certification Authority (CA), 167
Certified Information Systems Security Professional (CISSP), 78–79, 608
Certified Systems Engineer (MCSE), 608
Chad Mirkin, 460
Chain of Custody
analysis, 128, 158
contamination, 132
documentation, 136
establishment, 155
event reconstruction, 133
legal requirements, 135, 156
maintenance, 154, 158
notebooks, 157
secure location, 149, 157
snapshots, 136
timestamps, 133
training, 38
transportation, 149
Change Accumulation component, 112
character strings, 213
Charlemagne Hammer Skins, 330
Check Assets function, 117
checksums, 610
chemical weapons, 313–15
Cheng Wang, 243
Chief Information Officers (CIOs), 173–76, 197
child exploitation, 9
China Electronic Systems Engineering Company, 360–61
China’s Ministry of Public Security, 244
China’s State Encryption Management Commission, 566
Chinese embassy bombing, 283, 350
Chinese-made encryption devices, 360–61
Chinese second strike capability, 362
chipping, 299–300, 426, 441
chronometer, 444
Chuck Guzis, 145
Church of Scientology, 581
CIA, 546
CIBA-Geigy Corporation, 223
CIH, 352
Cisco Systems (formerly Arrow-Point Communications
anomaly-based network IDS products 86
routers 67
IDS development 585
Secure IDS 586
IDS switches 61
IT-ISAC (Information Technology Information Sharing and Analysis Center) 247
military useage 294
Network Associates, Inc. (NAI) 66
Secure IDS 586
Citibank, 574
Citigroup Inc., 388
civil litigations, 15, 27–28, 186
Civil Search Order, 22
civilian information operation (CIO), 508
CIW professional certification, 78
Class, 3 Digital ID, 166
CLD Consulting Engineers Inc., 398–99
Click + Drag Goth club, 331
client application security warning, 170
clients, 98
Clinton administration, 360, 473, 572
Clinton impeachment hearings, 49
CLIPPER Chip, 411, 519
clock filters, 194
cloned phones, 540
CNN, 250, 347, 405, 520
CNN.com, 405, 520
CoABS (See control of agent-based systems)
Coalition For Human Dignity, 307
code-division multiple access (CDMA), 478, 538
Codex Data Systems (CDS)
Cold War-era defense-spending, 288–89
collection notebooks, 156–57, 159
Collin Shu, 360
Columbine High School, 40
combat scenarios, 296–97
Command and Control Warfare (C2W), 289–92
command-and-control warfare campaign, 254
Commercial Bank of San Francisco, 388
commercial intrusion-detection software, 294
commercially available encryption, 387
common law tradition, 16–17
Communist Party, 347
company’s security officer, 175
Compaq Computer Corp., 199
Competition Act, 183–84
competitive intelligence (CI), 196, 200–01
Complementary Metal Oxide Semiconductor (CMOS), 138
comprehensive system back-ups, 299
Comprehensive Test Ban Treaty, 363
comprehensive testing and validation, 264
Computer Associates, 247
Computer Associates International, Inc. v. American Fundware, Inc., 133 F.R.D. 166 (D. Colo. 1990), 224
Computer Emergency Response Team (CERT), 55, 63, 228, 230, 571
Computer Forensic Incident Response Procedures (CFIRP), 62–64
Computer Forensics Experiment 2000 (CFX-2000), 32–33
computer forensics expert’s salaries, 576–77
computer literate criminals, 350
computer memory cards, 626
computer peripherals, 19
computer scams, 350
Computer Sciences Corp, 295
Computer Security Institute, 46, 69, 399, 569
Computer Security Institute/FBI survey, 46, 69, 399, 569
Computer Security Resource Center, 569
computer security reviews, 43
computer viruses, 259, 287–88, 440
Concordance, 213
Concurrent Pointer Checking function, 113
Conditions of Use policy, 63
configurable GUI interface, 221
Congress of Vienna, 383
consolidation attacks, 242, 255
consumer privacy, 530
content analysis, 264
content integrity, 165, 168
content searches, 625
content source, 165, 168
contraband, 606
controlled boot process, 621–22
control of agent-based systems (CoABS), 283
Conxion, 407
Cookie Crusher, 531
cookie-management tools, 488
CookieMaster, 531
Cookie Pal, 531
cookies, 413, 582
Coordinated Universal Time (UTC), 444
Coordinating Committee for Multilateral Strategic Export Controls (COCOM), 567
copper cable media, 438, 500
Cornell University, 459
corporate security/investigations personnel requirements, 619–21
Corsair Communications Inc., 539–40
Counterintelligence Center annual report, 434
counternarcotics relationships, 301
Counterpane Internet Security Inc., 66–67, 524, 559
counterterrorism operations, 302–03, 369
countries with IW attack capabilities, 259–61
covert antiterrorism organization plans, 426
CRC algorithm, 625
credit cards, 22
credit system’s personal identification, 533
Creditcards.com, 522
Criminal Code, 183
Critical Infrastructure Assurance Office (CIAO), 340, 383, 511
Critical Infrastructure Protection Directorate, 383
critical national infrastructures, 510
cryptographic digest, 168
cryptography, 168, 335, 565
CRYSTAL, 499
CTC Communications, 398–99
Cuba, 271, 373
Cuban missile crisis, 513
Cult of the Dead Cow Communications (cDc), 331
CyberArmy, 318–19
cyberarsenals, 350
CyberCop intrusion-detection software, 66
cybercrime treaty, 265–66
cyberdefense unit, 296
cyberdisarmament process, 271
cyber foot prints
angle of arrival (AOA) method, 477
car theft, 475
code-division multiple access (CDMA), 478, 538
criminal tracking, 475
differential GPS (DGPS), 446, 480
emergency operating mode, 475–76
enhanced signal strength (ESS) method, 481
forward link trilateration (FLT), 478
global positioning system (GPS), 478–79
Life Service Center, 474
Locus Corp., 474, 481
LoJack Corp., 477
Lucent Technologies Inc., 198, 480
packet data, 476–77
paging mode, 476
personal handy phone systems (PHS), 475–76
personal locator system (PLS), 474–75
PHS phone handset, 481
PHS service areas, 481
postage-stamp-sized chipset (Star II), 480
RF-tagged wildlife, 477
server-assisted GPS, 479–480
signal direction, 477–78
signal strength method, 480–81
signal timing methods, 480–81
SiRF Technology Inc., 443, 480
system architecture, 475–76
time difference of arrival (TDOA), 478
vehicle theft, 476–77
vehicular locators, 475
voice channel communications, 476
Cyberincident Steering Group, 246
cyberinsurance, 70–71
cyberintrusions pricing, 525
cyberpanel, 280–81
CyberSafe, 585, 587
Cyberspace Electronic Security Act (CESA), 411, 473
cyberspace hot pursuit capability, 203
Cyberspace Policy Institute of George Washington University’s 2001 encryption product survey, 568
cyberstrikes, 280, 295, 330, 346, 371
cybertactics, 243, 295–96
cybotagged, 427
Cyclic Redundancy Codes (CRCs), 145
cyclical redundancy checksums (CRCs), 36, 145
cylinder-head-sector (CHS), 623
cypherpunk, 414
Cyveillance, 409
| < Day Day Up > |
|