How Personal & Internet Security Works

Index

[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

caching data

CALEA (Communications Assistance for Law Enforcement Act)

call associated data (CDC)

call content information (CCC)

cameras, closed-circuit

CAPPSII (Computer Assisted Passenger Prescreening System) 2nd

cards (RFID)

Carnivore system (FBI)

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

CAs (certificate authorities) 2nd

CCC (call content information)

CDC (call associated data)

cell phones [See also Bluetooth.]

     bluebugging

     bluesnarfing

     cell phone cloners

     cell phone snoopers

     home location register (HLR)

     location tracking

     Paris Hilton case study

     viruses

     workplace surveillance

certificate authorities (CAs) 2nd

certificates, digital 2nd

checksums

China, web blocking and

choke routers

circuit-switched networks

cleaning data

clear to send (CTS)

client/server model

closed-circuit cameras

cobs

CODIS (Combined DNA Identification System)

Communications Assistance for Law Enforcement Act (CALEA)

Communications Decency Act

Computer Assisted Passenger Prescreening System (CAPPSII) 2nd

cookies

CoolMiner

corporate firewalls 2nd

credit cards

     black market credit card money trail

     credit card fraud, detecting

     identity theft

     theft of credit card information

credit repair scams

cryptosystems 2nd

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

CTS (clear to send)

Категории