Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

L0pht 2nd

L1-L6 assurance levels

LAN (local area network)

Laptop computers, vulnerabilities

Lattice security model

Laws [See also Legal issues.]

     California Breach Act

     CAN SPAM Act

     civil

     contract

     Council of Europe Agreement on Cybercrime

     criminal

     E.U. Data Protection Act

     fraud

     GLBA (Graham-Leach-Bliley Act)

     HIPAA (Health Insurance Portability and Accountability Act)

     information-related

         as object

         database protection

         depletion

         electronic commerce

         electronic publishing

         information commerce

         intangible transfer

         marginal cost

         replication

         time-dependent value

     protecting computer artifacts

     RIPA (Regulation of Investigatory Powers Act)

     statutes, definition

     statutes, examples

     tort

     U.S. Computer Fraud and Abuse Act

     U.S. Economic Espionage Act

     U.S. Electronic Communications Privacy Act

     U.S. Electronic Funds Transfer Act

     U.S. Freedom of Information Act

     U.S. Privacy Act

     USA Patriot Act

     versus ethics

Layered defense

Layered trust

Layering networks

Leaking

     access rights

     information [See also Covert channels.]

Least common mechanism

Least privilege

Legal control [See Laws; Legal issues.]

Legal issues [See also Ethical issues; Laws.]

     computer crime

         California Breach Act

         CAN SPAM Act

         Computer Fraud and Abuse Act

         computer terminology and the law

         confidentiality threats

         Council of Europe Agreement on Cybercrime

         cryptography 2nd

         defining

         E.U. Data Protection Act

         Economic Espionage Act

         Electronic Communications Privacy Act

         Electronic Funds Transfer Act

         Freedom of Information Act

         GLBA (Graham-Leach-Bliley Act)

         HIPAA (Health Insurance Portability and Accountability Act)

         integrity threats

         international dimensions

         overview

         Patriot Act

         Privacy Act

         prosecuting

         restricted content

         rules of evidence

         rules of property

         scope limitations

         statutes, examples

         value of data

     cryptography

     overview

     program and data protection

         computer objects

         copyright 2nd

         documentation protection

         domain names

         firmware

         hardware

         object code software

         patents 2nd

         reverse engineering

         source code software

         trade secrets 2nd

         trademark

         URLs

         web content

     rights of employees and employers

         copyright ownership

         employee contracts

         licensed software

         patent ownership

         product ownership

         trade secrets

         work for hire

     software failure

         full disclosure

         overview

         quality demands

         quality software

         refunds

         reporting flaws

         selling correct software

         user interests

         vendor interests

         warranty of cyberworthiness

Legislation [See Laws.]

Levy, Elias

Lewis, John

Library viruses

Licensed software

Limited privilege

Limited response suppression

Linear system vulnerability

Link encryption

Links, network

Linux

Litchfield, David

Lloyd's Bank

Local area network (LAN)

Local name space

Locks

     access control

     integrity 2nd

     sensitivity

     "spray paint,"

Logic bombs 2nd

Logic errors

Logical separation 2nd

Logs

     audit

     database changes

     database transactions

     reduction

Loose versus tight organizational control

Loose-lipped system

Lower bound

Lucifer algorithm

Lynn, Michael

Категории