Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

F1-F10 functionality classes

Fabrications

Face recognition authentication [See also Biometrics.]

Factoring large numbers 2nd

Failover mode

Failure 2nd

Failure modes and effects analysis (FMEA) 2nd

Fair Credit Reporting Act

Fair information policies 2nd

Fair service guarantee

Fair use

Fairbrother, Peter

FAIS (Foreign Affairs Information System)

False intrusion detection

False positives

Falsifying messages

Fame, attack motive

Fault tolerance, networks

Fault tree analysis (FTA) 2nd

Faults

     active detection

     definition

     fixing

     passive detection

Faux environment

FBI

     al Qaeda computer

     breaking WEP

     Computer Crime and Security Survey 2nd

     loss from attacks

     organized crime

     stolen laptops

     survey of cyberattacks

     value of cybersecurity

Federal Educational Rights and Privacy Act

Federal Trade Commission (FTC)

Federated databases

Felten, Edward

Fence register

Fences

Fermat's theorem

Field checks, databases

Fields, databases

File lock channel

File names, iishack problem

File protection

     all-none

     group

     individual permissions

     per-object

     per-user

     persistent permissions

     SUID (set userid)

     temporary acquired permissions

Files

    access control [See Access control.]

     directory access

     erasing deleted 2nd

Filters

     database reliability

     multilevel databases

     polarizing

Final permutation 2nd

fingerd flaw 2nd

Fingerprint authentication [See also Biometrics.]

Fingerprint, operating system or applications

Fires

Firewalls

     network encryption

     networks

         application proxy gateway

         authentication

         comparison of

         definition

         design

         guards

         limitations

         overview

         packet filtering gateway

         personal

         sample configuration

         stateful inspection

         types of

     rules set

Firmware, legal issues

First sale

Flaws

     aliasing

     ambiguous access policies

     authentication

     boundary conditions

     definition

     domain errors

     exploitation examples

     identification

     incomplete mediation

     known vulnerabilities

     logic errors

     overview

     serialization

     time-of-check to time-of-use flaws

     types of

     typical flaws

     user interface vulnerability

     validation errors

Floods

Flow analysis

FMEA (failure modes and effects analysis) 2nd

Follett, Ken

Footprints, satellite broadcast

Foreign Affairs Information System (FAIS)

Forgery 2nd

Formal methods

Formal verification

Format failures

Fortezza [See also Keys (encryption) escrow.]

Frames, network

Framing the issue

Fraud

     Computer Fraud and Abuse Act

     ethical issues

     laws

Free rides

Free speech, and cryptography

Freedom of Information Act

Frequency probability

Front end

     databases

     trusted

FTA (fault tree analysis) 2nd

FTC (Federal Trade Commission)

Full disclosure

Full plaintext attacks

Functional correctness

Future earnings, adjusting

Категории