Computer Security Basics

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

TACACS

tag abuse

Tan Book

taps

TCSEC

TEA

telephone connections

TEMPEST 2nd 3rd

     Endorsement Programs (TEP)

     Faraday screen

     Industrial TEMPEST Program

     initial standards

     NACSEM 5100

     Optical

     Products Program

     program overview

     security, containment approach

     source suppression

     standards

     Test Services Program

     Zoned Equipment Program

Temporal Key Integrity Protocol (TKIP) 2nd

terminal

Terminal Access Controller Access Control System (TACACS)

terrorists

test documentation requirement

testing equipment

Thompson, Ken

threats

     countermeasures

     insiders and outsiders

     intentional and unintentional

     natural

     physical

     vulnerabilities

tickets 2nd

tiger teams

time bombs

time-to-live (TTL)

tokens 2nd 3rd

     active

topology

traffic analysis

training users

tranquility property

Transmission Control Protocol/Internet Protocol (TCP/IP)

Transport Control Protocol (TCP)

     attacks

transposition ciphers 2nd

trap door

Trivial File Transfer Protocol (TFTP)

Trojan horses 2nd 3rd

     bombs

trunk, communications

Trusted Computer System Evaluation Criteria (TCSEC)

Trusted Database Management System Interpretation (TDI) (Lavender Book)

trusted distribution

trusted facility management

Trusted Facility Manual (TFM)

Trusted Network Interpretation (TNI) (Red Book)

trusted recovery

trusted system

tunneling

Turing, Alan

twisted pair cable

two key

two-factor authentication

TWOFISH

Категории