Computer Security Basics

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

access cards, types of

access controls

     ACLs

     data

     discretionary

     discretionary access control (DAC)

         ownership

         self/group/public controls

     in practice

     mandatory

     mandatory access control (MAC) 2nd

         access decisions

         data import and export

     passwords

     role-based access control (RBAC) 2nd

     system

     why use

access decisions

access points

     hardening

     rogue

accessibility

accountability 2nd

accuracy

accuracy of information

Active Directory

active electronic card

Active Server Pages

active taps

ActiveX

     malicious controls

ad hoc infrastructure

Address Resolution Protocol (ARP)

Adleman, Leonard

administrative security

     analyzing costs and risks

     employees, setting security rules for

     overall planning and administration

     planning for disaster

     training users

Advanced Encryption Standard (AES) 2nd 3rd

     development effort

     how it works

Advanced Encryption System (AES)

     protocol

Advanced Research Projects Agency (ARPA)

algorithms, government

American National Standards Institute (ANSI)

amplitude

amplitude modulation (AM)

Anderson, James P.

ANSI X3.105

ANSI X3.106

ANSI X3.92

antenna

     gain

antivirus programs

AppleTalk

applets

     malicious

application traffic

arbitrated

ARNES (Academic and Research Network of Slovenia)

ARPANET

assurance

     life-cycle 2nd

     operational

asymmetric key

asynchronous transfer mode (ATM)

ATMs

Atomic Energy Act of 1946

audit logging

audit, security

auditing

AusCERT (Australian CERT)

authentication 2nd 3rd 4th 5th 6th 7th

     multifactor

     mutual

     per-session

     server (AS)

     two-factor

authenticator

authenticity

authorization 2nd

     access models

     Bell-LaPadula model

     Biba model 2nd

     categories or compartments

     classification

     sensitivity labels

Automated Password Generator (APG)

availability

availability of networks

Категории