Computer Security Basics

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C-I-A acronym

Caesar, Julius

calendar date standards

California Data Security Act (California SB 1386)

campus area networks

Canada's first national Computer Emergency Response Team

Canadian Trusted Computer Product Evaluation Criteria (CTCPEC)

CanCERT

CANs

capacitance card

CAST

CAST-256, Entrust Technologies, Inc. (represented by Carlisle Adams)

cells in ATM

central office (CO)

CERT Polska

certificates 2nd

challenge and response

Challenge Handshake Authentication Protocol (CHAP)

challenge-response systems

channels

checksum

Cipher Block Chaining (CBC)

Cipher Feedback (CFB)

ciphers

     substitution 2nd

     transposition 2nd

     types

ciphertext

circuit

circuit switching

Cisco Certified Security Professional (CCSP)

civil libertarians

classification

cleartext

client-side attacks

     web

client-side scripts

     languages

climate

cloak

CNRS

     Centre National pour la Recherche Scientifique, Ecole Normale Superieure (represented by Serge Vaudenay)

coaxial cable

Code Red virus

codetext

Cohen, Fred

cold sites

ColdFusion

     ColdFusion Markup Language (CFML)

Commercial Communications Security Endorsement Program (CCEP) 2nd

Common Criteria 2nd

Common Criteria Evaluation Assurance Levels (EALs)

Common Criteria Recognition Arrangement (CCRA)

Common Gateway Interface (CGI)

Communications Act of 1934

communications and network security

     active taps

     appropriate technology

     passive taps

     threats

     vulnerabilities

     what makes communication secure

communications integrity

communications security

communications vulnerabilities

compartmentalized information

compromise protection services

CompTIA's Security+

computer crime

Computer Emergency Response Team (CERT)

Computer Fraud and Abuse Act 2nd

Computer Incident Advisory Capability (CIAC)

computer security

     accuracy

     audit logging

     authentication

     availability

     biometric security

     broad definition of

     changes over the years

     confidentiality

     early efforts

         research and modeling

         security systems development

     history

     integrity

     mandates and legislation

         balancing act

         Computer Fraud and Abuse Act

         Computer Security Act of 1987

         recent initiatives

     overview

     secrecy

     standardization

         cryptography

         emanations

     what users can do

Computer Security Act of 1987

Computer Security Evaluation Center (CSC)

computer system security

     data access controls

     security administration

     system access controls

     system administration

     system design

     what makes system secure

Computer Underground Digest

COMSEC (U.S. Communications Security)

confidentiality 2nd 3rd 4th

connection-oriented communications

connectionless communications

cookies

     poisoned

     stolen

Core Wars

corporate raiders

costs of security, analyzing

countermeasures

     communications security

     computer security

     physical security

counties and statistically equivalent entities

Courtney, Robert H., Jr.

crackers

criminals

Critical National Infrastructure (CNI)

cross-site scripting (CSS)

cryptanalysis

cryptogram

cryptographic

     export restrictions

     locks

     modules

     products

cryptography

     standardization

cryptology

CRYPTON

     Future Systems, Inc. (represented by Chae Hoon Lim)

Категории