Web Security, Privacy and Commerce, 2nd Edition
only for RuBoard - do not distribute or recompile | |
Web Security, Privacy & Commerce, 2nd Edition
[Symbol][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]C C language, programming guidelines
See : csh C shell
cables, network , 2nd routing of
tampering detectors for
wiretapping
CAPI (Cryptographic API)
carbon monoxide
Card Shark
CAs (certification authorities) , 2nd , 3rd certificates for
certificates, included in browsers, inconsistencies
certificates, obtaining from
competition of
creating for Apache web servers
history
multiple certificates offered by
need for
private keys, protections of
quality control problems of
RSA Certification Services
types of services
X.509 v3 certificates
CDA (Communications Decency Act)
CDP (CRL distribution point)
ceilings, dropped
cellular telephones
censorship
See : filtering software censorware
CERN (European Laboratory for Particle Physics)
CERT (Computer Emergency Response Team) , 2nd CERT/CC, PGP signature
Cert2SPC.exe
Certificate Requests
certificate stores
certificates , 2nd , 3rd certification authorities, for
client-side
managing users with
obtaining from CAs
renewing
revoking
short expiration times
software publisher s
SSL, causes of invalidation in
VeriSign Digital ID Center
web servers under SSL
CertificateVerify message
See : CAs certification authorities
certification of public keys
CertMgr.exe
CGI (Common Gateway Interface) , 2nd example script
extensibility of
programming guidelines
programs to exclude from
cgi-bin directory
challenge-response
change detection tools
ChangeCipherSpec
characters, filtering
charga-plates
charge-backs
charge slips
chargen utility
Chaum, David
check digit algorithm Perl encoding
check digits
CheckFree services
See : verification checking
child pornography
Children s Internet Protection Act , 2nd
See : COPPA Children s Privacy Protection Act
ChkTrust.exe
chosen plaintext attacks
chrootuid daemon
CIAC (Computer Incident Advisory Capability)
See : encryption ciphers
circular hunting
Clark, Jim
class loader, Java , 2nd
clear GIFs
client certificates
'client-sniffing' code
client/server model
ClientHello
clients client-side digital certificates
Clipper chip , 2nd
CLSID (Class Identifier)
COCOM (Coordinating Committee for Multilateral Export Controls)
Code of Fair Information Practices
code signing Authenticode
current systems
DSig
PGP, with
vulnerabilities
cold, impact on hardware
commerce identification and
Internet-based payment systems
merchant fees
reverse charge transactions
Communications Decency Act (CDA)
compact policies , 2nd
computer failure
computer forensics
computer networks , 2nd
computer security physical
references for
unattended systems
Computer Security Resource Clearinghouse (CSRC)
computer theft, preventing laptop locks
precautions
recovery software and services
tagging
computer vacuums
See : vandalism computer vandalism
See : worms computer worms
computers, environmental threats to
Computrace
confidentiality
configuration files
confiscation of property
connectors, network
consistency checking
content types application/pics-labels
application/pics-service , 2nd
content updating
contingency planning
continuity of identification
cookies applications
cookie jars
crushing
disabling
implementation and uses
Internet Explorer 6.0, and
privacy, and
profiles, creating with
protocol
removal Netscape Navigator, from
RFC 2109
secure generation and decoding
security
security advantages over hidden fields
third-party cookies
cookies.txt file
COPPA (Children s Online Privacy Protection Act) exceptions
FTC, and
jurisdiction
parental consent, and
provisions
copper network cables, routing of
COPS (Computer Oracle and Password System)
copy protection systems
copyright email forwarding, and
infringement
core dumps, security of
core files
corporations
Council of Better Business Bureaus, BBBOnLine
Council of Europe
courtesy cards
CPS (certification practices statement) maintenance, problems with
viewing
CPU attacks
CPU time limits
crackers, profiles of
Cranor, Lorrie
credit history
credit card sniffers
credit cards , 2nd authentication mechanisms
check digits
evaluating system for
fees
Internet, usage on
SET protocol for
United States, use in
credit reports, monitoring
crimes
criminal laws
CRL (certificate revocation list)
crushing cookies
cryptanalysis
Crypto Law Survey
cryptographic protocols offline
online
cryptographic systems strength
cryptographically enabled web servers
cryptography applications
attacks against
domestic use restrictions
dual signatures
export controls, and
government regulation of
history
import/export restrictions
international agreements
Internet, use in securing
legal restrictions
limitations
message digests
patents
public keys , 2nd
roles in information systems
securing information sent to web applications
symmetric key algorithms
trade secret laws
csh (C shell), autologout variable
.cshrc file
CSRC (Computer Security Resource Clearinghouse)
custom software
cvsup command
CyberCash system
See : crime cybercrime
only for RuBoard - do not distribute or recompile | |