Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

D, TCSEC class

DAC (discretionary access control)

Daemen, John

Danseglio. Mike

Data [See also Information.]

     access risks

     anonymization

     availability, databases

     form checks, database

     justifying cost of security

         accuracy

         consistency

         reliability

         representative

     left in place

     minimization

     perturbation

         data mining

         database attacks

         database inference

         privacy

         random

    secrecy [See Confidentiality; Privacy.]

     semantics, data mining

     sensitivity

     stored, protecting

Data Encryption Algorithm (DEA) [See also DES (Data Encryption Standard).]

Data Encryption Algorithm-1 (DEA-1) [See also DES (Data Encryption Standard).]

Data mining [See also Databases.]

     case study

     comparable data

     correcting mistakes

     data availability

     data correctness

     data semantics

     definition

     eliminating false matches

     integrity

     overview

     privacy

         aggregation of data

         correlation of data

         data perturbation

         government

         preserving privacy

         sensitivity

Data Protection Act

Database administrators 2nd

Database management system (DBMS)

Databases [See also Data mining.]

     advantages of

     aggregation [See also Inference.]

     attributes

     components of

     decentralization

     definition

    deleting fields and records [See Queries.]

    editing fields and records [See Queries.]

     elements

     fields

    front end [See DBMS (database management system).]

     inference [See also Aggregation.]

         combined results control

         concealing control

         controls for

         count attacks

         definition

         direct attack

         indirect attack

         limited response suppression

         linear system vulnerability

         mean attacks

         median attacks

         problem summary

         query analysis

         random data perturbation

         random sample control

         statistical inference attacks

         sum attacks

         suppression control

         tracker attacks

     logical structure

    manipulating [See Queries.]

     protection laws

     queries

     records

         definition

        manipulating [See Queries.]

         projecting

         selecting

     relations

     reliability

         commit flag

         committing updates

         concurrency

         consistency 2nd

         correction codes

         data form checks

         definition

         error detection

         filters

         intent phase

         monitors

         operating system protection features

         patterns

         recovery from backup

         redundancy

         shadow fields

         shadow values

         state constraints

         transition constraints

         two-phase update

    retrieving fields and records [See Queries.]

     schema

     security requirements

         access control 2nd

         auditability

         availability

         change logs

         confidentiality

         configuration management

         field checks

         inference

         integrity 2nd

         pass-through problem

         release proliferation

         user authentication

         version proliferation

     sensitive data

         access acceptability

         access decisions

         authenticity

         bounds disclosure

         characteristics of

         data availability

         definition

         disclosures, types of

         exact data disclosure

         existence disclosure

         negative result disclosure

         overview

         probable value disclosure

         security versus precision

     subschema

Databases, multilevel

     confidentiality

     differentiated security

     duplicate records

     granularity

     integrity

     polyinstantiation

     redundancy

     security designs

         commutative filters

         distributed databases

         federated databases

         filtering

         guards

         integrity locks

         practical issues

         trusted front-end

         views

         windows

     security issues

     security proposals

         cryptographic checksum

         encryption

         integrity lock

         partitioning

         sensitivity lock

         separation

         "spray paint" lock

         Summer Study on Database Security

Datagrams

DBMS (database management system)

DDoS (distributed denial of service) [See also Availability ; DoS (denial of service).]

     diagram of

     network threat

     TFN (Tribal Flood Network) 2nd

     TFN2K 2nd

de Vere, Edward

DEA (Data Encryption Algorithm) [See also DES (Data Encryption Standard).]

DEA-1 (Data Encryption Algorithm-1) [See also DES (Data Encryption Standard).]

Debugging code [See also Testing code.]

Decentralization, databases

Deceptive practices

Deciphering data [See Decryption.]

Decision making

Decoding data [See Decryption.]

Decryption

     algorithm

     definition

     DES (Data Encryption Standard)

     knapsacks

Defacing web sites

Defense methods [See also Controls.]

     privacy principles and policies

     viruses

Defining computer crime

Degaussing magnetic data [See also Magnetic remanence.]

Deleting

    database fields and records [See Queries.]

     PDF text

     Word text

Deloitte and Touche Tohmatsu Global Security Survey

Delphi approach

Delta (configuration control method)

Denial of service (DoS) [See DoS (denial of service).]

Deontology

Department of Energy (DOE) policy

Department of Trade and Industry (DTI)

Depletion of information

DES (Data Encryption Standard) [See also AES (Advanced Encryption System).]

     algorithm design

     background

     brute force attack

     complements

     cycle details

     cycle, example

     decryption

     design weaknesses

     differential cryptanalysis 2nd

     double DES

     encryption algorithm

     expansion permutations 2nd

     final permutation 2nd

     history

     initial permutation 2nd

     inverse initial permutation 2nd

     key clustering

     key length

     key transformation

     Lucifer algorithm

     number of iterations

     overview 2nd

     P-boxes 2nd

     parallel attack

     permutation cycle

     permutation types

     permuted choices

     product cipher

     S-boxes 2nd

     security of 2nd 3rd

     semiweak keys

     substitution cycle

     triple DES

     versus AES

     weak keys

     weaknesses

Destination unreachable protocol

Determining economic value [See Economics of cybersecurity.]

DHCP (Dynamic Host Configuration Protocol)

Diamond v. Bradley

Diamond v. Diehr

Difference files

Differential cryptanalysis 2nd

Differentiated security, multilevel databases

Diffie-Hellman key exchange

Diffusion 2nd

Digital distributed authentication

Digital Equipment Corporation

Digital Millennium Copyright Act (DMCA) 2nd

Digital network communication

Digital objects [See Objects, digital.]

Digital Signature Algorithm (DSA)

Digital Signature Standard (DSS)

Digital signatures

Digram analysis

Digrams

Direct attack

Directive 95/46/EC

Directories

"Dirty" power

Disaster recovery [See Backing up data; Physical security; Recovery from backup.]

Disaster, natural [See Natural disasters.]

Disclosure

     bounds

     controlled

     exact data

     existence

     negative result

     of software problems

     privacy issues

     probable value

     types of

Discount rate

Discretionary access control (DAC)

Distributed authentication

Distributed databases

Distributed denial of service (DDoS) [See DDoS (distributed denial of service).]

Division, cryptography

DMCA (Digital Millennium Copyright Act) 2nd

DNS attacks

DNS cache poisoning

Document viruses

Documentation

     availability, network threat

     protection, legal issues

DOE (Department of Energy) policy

Domain errors

Domain names 2nd

Domain switching

Domains

Dominance

DoS (denial of service) [See also Availability ; DDoS (distributed denial of service).]

     broadcast mode

     connection flooding

     DNS attacks

     DNS cache poisoning

     echo chargen

     estimated activity

     ethical issues

     network threat

     ping of death

     smurf attack

     SYN flood

     teardrop attacks

     traffic redirection

     transmission failure

Dot-dot-slash directory travel

Double DES

DoubleClick

Drive-by installation

Drops, electrical

DSA (Digital Signature Algorithm)

DSS (Digital Signature Standard)

DTI (Department of Trade and Industry)

Dumpster diving

Dunham, Ken

Duplicate database records

Durability

Dynamic Host Configuration Protocol (DHCP)

Категории