Security Technologies for the World Wide Web, Second Edition

I

Inbound connection, 51, 55 “58

Information Technology Security Evaluation Criteria, 13

Initialization vector, 130, 172, 174

Initiator, 334

Inner network segment, 70

Insider attack, 53

Institute of Electrical and Electronic Engineers, 118

Integrated Network Layer Security Protocol, 126

Integrated services digital network, 118, 121

Integrity certificate, 271

Intellectual property protection, 347 “49

Intermediary, Hypertext Transfer Protocol, 25 “26

Intermediate certificate, 177

Intermediate certificate authority, 192

Intermediate system, 50

International data encryption algorithm, 95

International Electrotechnical Committee, 187, 198, 242

International Organization for Standardization, 125, 143, 187, 198, 242

International Standard 15408, 13

International Telecommunication Union Telecommunication Standardization, 187, 198, 242

Internet, 1 “5, 117, 169

Internet Architecture Board, 4

Internet Assigned Numbers Authority, 133, 156, 157

Internet Engineering Steering Group, 175

Internet Engineering Task Force, 61, 76, 122, 127, 128, 137, 138, 142 “44, 146, 171, 175, 187, 188, 242, 381

Common Authentication Technology Working Group, 239

Public-Key Infrastructure Working Group, 185, 187, 193 “96, 198, 200

Internet Explorer, 7, 77 “78, 154, 176, 181, 201, 202 “5, 207, 273, 275, 286 “89, 326, 327, 343, 368 “71

Internet Inter-ORB Protocol, 63, 179

Internet-Keyed Payments Protocol, 261

Internet key exchange, 128 “29, 136 “41

security association, 139 “40

Internet Key Management Protocol, 127 “28

Internet layer security

architecture, 128 “31

IKE Protocol, 136 “41

implementations , 141 “42

IPsec Protocols, 131 “36

overview, 125 “28

Internet message access protocol, 155, 157

Internet Protocol, 119

address blocking, 361 “63

Secure Tunnel Protocol, 137

version 4, 63, 74, 127

version 6, 63, 74, 76, 127

Internet Protocol security, 124

implementations, 141 “42

protocols, 128, 131 “36

security architecture, 128 “31

security association, 140 “41

Internet Protocol security protocol, 127

Internet Protocol Security Working Group, 127, 128, 137, 142

Internet Security Association and Key Management Protocol, 128, 137, 138

Internet server application programming interface, 299, 309

Internet service provider, 319, 360, 364

Internet Worm, 3, 272

Internet X.509 public key infrastructure, 196

Internet zone, 288

Interpretation attack, 356

Interpreter application, 274

Interprocess communications facility, 143

Intranet, 50

Intranet firewall, 53

Intrusion detection, 381

Intrusion Detection Exchange Format Working Group, 381

Intrusion detection systems, 379, 381 “82

Invisible digital watermark, 353

IPX protocol, 119

IRC protocol, 155

Issuer, 253

Категории