Internet Denial of Service: Attack and Defense Mechanisms

 

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]

Lagging attacksLaw enforcement. [See legal issues.]

Laws. [See legal issues.]

Legal attache (LEGAT) Legal issues. [See also moral issues, social issues.]

     18 U.S.C. §1030 (a)(6) (Trafficking in Passwords)

     18 U.S.C. §1030 (Computer Fraud and Abuse Act)

     18 U.S.C. §1030(a)(3) (Trespassing on Government Computers)

     18 U.S.C. §2510 (Wiretap Statute)

     access, legal definition

    Active Network Defense. [See Active Network Defense (AND).]

     APIG (All Party Internet Group)     applicable laws

     CERT/CC, reporting to

     chain of custody

     civil law 2nd     class action suits     computer data, as property

     criminal culpability

     criminal law 2nd    damages         aggregating

         cost-estimation model

         estimating

         hidden costs

         ICAMP (Incident Cost Analysis and Modeling Project)         IRC (Internet Relay Chat)

         loss, definition 2nd

         trigger for federal statutes         United States v. Middleton

     Department of Justice Cybercrime Web site

     domestic     dual criminality     electronic communication privacy     EURIM (European Information Society Group)

     evidence collection

     extortion

     extradition

     frequency of legal involvement

     health care

     identifying perpetrators

     impairing access to data

     incident response procedures

     initiating legal proceedings

     international, current

     international, trends

     involving legal authorities

     jurisdictional issues     LEGAT (legal attache)     letters rogatory

     liability

     military responses     MLATs (mutual legal assistance treaties)

     national defense

     NIPC (National Infrastructure Protection Center), reporting to

     PCCIP (President's Commission on Critical Infrastructure Protection)

     phone contacts

     prognosis

     record keeping

     reporting requirements     reporting suspected crimes 2nd

     self-help options

     Tortious Interference with Business Relationship or Expectancy

     Trafficking in Passwords (18 U.S.C. §1030(a)(6))     trespassing on government computers     U.S. legal system

     U.S. Secret Service, Electronic Crimes Branch, reporting to

     unauthorized, legal definition     viability of prosecution     victim negligence

     victim profile

     wiretaps

LEGAT (legal attache)

Legislation     CMA (Computer Misuse Act) (United Kingdom)

     Computer Fraud and Abuse Act (18 U.S.C. §1030)

     Graham-Leach-Bliley Act     HIPAA (Health Insurance Portability and Accountability Act)

     "Privacy Law" (Italy)

     United States v. Dennis 2nd     USA PATRIOT Act of 2001     Wiretap Statute (18 U.S.C. §2510)Legitimate traffic. [See service differentiation.]

Letters rogatory

Liability issues 2nd [See also legal issues.]

libcap format

Lion (1i0n) worm

Litigation. [See legal issues.]

Locality principle

Loki

Loss estimates. [See cost of attacks, damages.]

Loss, legal definition

Loveless, Mark (Simple Nomad) 2nd

lsof

 

Категории