Computer Security Basics

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

safe computing, hints for

SAFER

sandbox

Sarbanes-Oxley Act

     Family Educational Rights and Privacy Act (FERPA)

satellite 2nd

Schmidt, Hans-Thilo

Schoch, John

script kiddies 2nd

scripting

scripts 2nd

secrecy 2nd

secret key

Secure Hash Standard (SHS)

Secure Telephone Unit (STU-III) project

security administration

security administrator functions

Security Assertion Markup Language (SAML)

security audit

security classification, comparing with subject's security clearance

security consultants

     international

Security Controls for Computer Systems

Security Features User's Guide (SFUG)

security kernel

security label syntax

security model

security policy 2nd

     administrative security

         overall planning and administration

     establishing and maintaining

     multilevel

self/group/public controls

semaphore system

sensitivity labels 2nd

separation of duties 2nd

SERPENT

server key

server-side attacks

     web

server-side scripts

     languages

Service Provisioning Markup Language (SPML)

servlets

session

session keys

shadow password files

Shamir, Adi

SHARK

shell scripts

Shockwave Rider, The

SI-CERT

signaling equipment

signature-writing pattern

Simple Mail Transfer Protocol (SMTP) 2nd

simple security condition

SingCERT (Singapore CERT)

single key

single-level device

SKIPJACK

Slovenian Computer Emergency Response Team

smart cards 2nd

smart keys

smashing the stack

sniffers 2nd

Softwar: La Guerre Douce

software security tools

software vulnerabilities

source suppression

Spafford, Gene

spam

spoofing 2nd

spread spectrum systems

Spring Joint Computer Conference of 1967

spyware

SQUARE

standardization

     cryptography

     emanations

star property

state two-digit numeric codes

stealth

Steinauer, Dennis

Stoll, Cliff

subject sensitivity label

substitution ciphers 2nd

summarizes

suspicious user activity

switching systems

symmetric key

system access

system access controls

system administration

system administrator/operator functions

system design

Категории