Computer Security Basics

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

packet sniffers

packet switching and packets

packet-switching networks

packets

PANs

parabolic reflector

Partnership for Critical Infrastructure Security

passive electronic card

passive taps

Password Authentication Protocol (PAP)

password sniffers

passwords 2nd 3rd 4th

     access controls

     cracking

     encryption

     hash

     hints for picking

     hints for protecting

     message digest

     one-time password (OTP)

     protecting

     protecting in storage

     sample controls

     shadow password files

Patriot Act 2nd

payload

PCMCIA (PCCARD)

per-session authentication

perimeters

Perl

Personal area networks

phantom circuits

photo ID card

PHP

Phrack

physical addresses

physical security 2nd

     climate

     earthquakes

     electricity

     fire and smoke

     lightning

     natural disasters

     risk analysis and disaster planning

     water damage

physical vulnerabilities

plaintext

playback

playback or a replay attack

plug-ins

PoE

Point-to-Point Tunneling Protocol (PPTP)

Polish security consultants

Port Address Translation (PAT)

port numbers

Presidential Directive Number 63

Pretty Good Privacy (PGP)

privacy

     considerations

     personal

private keys

protocols 2nd

     family

     model

     suite

public key algorithms

public keys 2nd

     disadvantages

Public Law 99-474

pulse modulation (PM)

Purple Book

Python

Категории