Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

I/O operation

IBM

     history of DES

     Lucifer algorithm

     MVS/ESA operating system

     Processor Resources/System Manager (PR/SM)

     U.S. government suit

IC3 (Internet Crime Complaint Center)

Icelandic DNA database

ICMP (Internet Control Message Protocol)

Identification

     errors

     principles of trusted systems

     versus authentication

Identity (authentication) 2nd

Identity (mathematical)

Identity theft 2nd

Ideology, attack motive

IDS (intrusion detection system)

     anomaly based

     Common Intrusion Detection Framework

     definition

     false results

     goals for

     heuristic 2nd

     host based

     misuse

     model based

     network based

    networks [See Networks; IDS (intrusion detection system).]

     overview

     principles of trusted systems

     response to alarms

     signature based 2nd

     state based

     statistical analysis

     stealth mode

     strengths and weaknesses

     types of

IEEE (Institute for Electrical and Electronics Engineers)

     code of ethics 2nd

     Standard 2nd

IIS (Internet Information Server) 2nd

iishack problem

IKE (ISAKMP key exchange)

Images, signaling through [See Steganography.]

Imation Data Protection Survey

Imbruglia, George

Impedance, electrical

Impersonation

     man-in-the-middle attack

     masquerade

     network threat

     of login

     phishing 2nd

     session hijacking

     spoofing

         cryptographic protection

         interface illusions

         network vulnerability

         trusted path

     steganography

     trusted systems

     web bugs 2nd

Implementation flaws

Incident response plans

Incident response teams

Incomplete mediation 2nd [See also Complete mediation.]

Independent testing

Indirect attack

Individual authentication 2nd

Inductance

Industrial espionage

Inference, database attacks

     combined results control

     concealing control

     controls for

     count attacks

     direct attack

     indirect attack

     limited response suppression

     linear system vulnerability

     mean attacks

     median attacks

     problem summary

     query analysis

     random data perturbation

     random sample control

     statistical inference attacks

     sum attacks

     suppression control

     tracker attacks

Information [See also Data; Databases.]

     anarchy

     collection, privacy issues 2nd

     commerce

     depletion

     disclosure, privacy issues

     flow analysis

     hiding

     leaks [See also Covert channels.]

     replication

     retention, privacy issues

     security, privacy issues

     usage, privacy issues

Information officers, security responsibilities

Information Security Breeches Survey (ISBS) 2nd

Information Technology Security Evaluation Criteria (ITSEC) 2nd

Informed consent

Infrared networks

Inherently hard problems

Initial permutation 2nd

Inspection, code

Installation testing

Instances

Institute for Electrical and Electronics Engineers (IEEE)

     code of ethics 2nd

     Standard 2nd

Intangible transfer

Integrated viruses

Integrated Vulnerability Assessments (IVAs)

Integration testing 2nd

Integrity

     *-property

     data 2nd

     data mining

     databases 2nd [See also Reliability.]

     definition

     economic

     enforcement

     locks 2nd

     multilevel databases

     overview

     threats

Intellectual property

Intelligence gathering

Intent phase

Intercepting sensitive information

Interception 2nd 3rd

Interceptors

Interface illusions

Internal networks

Internal rate of return (IRR)

Internet [See also Web sites.]

Internet Control Message Protocol (ICMP)

Internet Crime Complaint Center (IC3)

Internet Information Server (IIS) 2nd

Internet protocol [See IP addresses.]

Internet Scanner

Internet Security Association Key Management Protocol (ISAKMP)

Internet Security Systems (ISS)

Internet worm

Internets

Interprocess communication

Interruptions

Intrinsic good

Intruders

Intrusion detection system (IDS) [See IDS (intrusion detection system).]

Intrusion, characteristics

Inverse initial permutation 2nd

Inverses 2nd

Invisible gif [See Web bugs.]

IP addresses

     resolution

     shortage of 2nd

    spoofing [See Spoofing.]

     translation 2nd

IPSec (IP Security Protocol Suite)

IPv6

Iris pattern authentication [See Biometrics.]

IRR (internal rate of return)

ISAKMP (Internet Security Association Key Management Protocol)

ISAKMP key exchange (IKE)

ISBS (Information Security Breeches Survey) 2nd

ISO OSI (Open Systems Interconnection) model

Isolation

ISS (Internet Security Systems)

ITSEC (Information Technology Security Evaluation Criteria) 2nd

Ivanov, Alexey

IVAs (Integrated Vulnerability Assessments)

Категории