Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Napster

National Institute of Standards and Technology (NIST)

National Research Council (NRC)

National Security Agency (NSA) 2nd 3rd

Natural disasters

NBS (National Bureau of Standards) 2nd

NCSC (National Computer Security Center) 2nd

Negative result disclosure

Nessus

Net present value

netcat scanner

Network interface cards (NICs)

Network-based intrusion detection

Networked backups

Networks

     address shortage 2nd

     amplifiers

     analog communication

     angle of dispersion

     boundaries

     cables

         coaxial

         eavesdropping

         Ethernet

         impedance

         inductance

         networking

         UTP (unshielded twisted pair)

         wiretapping

     CAN (campus area network)

     clients

     coaxial cable

     communication mode

     control

     datagrams

     diagram of

     digital communication

     domain names

     environment of use 2nd

     Ethernet cable

     fault tolerance

     firewalls

         application proxy gateway

         comparison of

         definition

         design

         guards

         limitations

         overview

         packet filtering gateway

         personal

         sample configuration

         stateful inspection

         types of

     footprints

     frames

     geosynchronous orbit

     hosts

     IDS (intrusion detection system)

         anomaly based

         definition

         false results

         goals for

         heuristic 2nd

         host based

         misuse

         model based

         network based

         overview

         response to alarms

         signature based 2nd

         state based

         statistical analysis

         stealth mode

         strengths and weaknesses

         types of

     infrared

     internets

     LAN (local area network)

     layering

     links

     MAC (Media Access Control) address

     MAN (metropolitan area network)

     media

     microwave

     NICs (network interface cards)

     nodes

     opaqueness

     optical fiber

     OSI (Open Systems Interconnection) model

     overview

     ownership

     packets 2nd

     peers

     port numbers

     protocol stack

     protocols

     repeaters

     resilience

     routers

     routing concepts

     satellite

     secure e-mail

         confidentiality

         designs

         encryption

         keyrings

         MIC (message integrity check)

         PGP (Pretty Good Privacy)

         requirements

         ring of trust

         S/MIME (Secure MIME)

         sample systems

         solutions

         threats

     servers

     sessions

     shape

     single point of failure

     size

     SYN_RECV connections

     TCP protocols

     TCP/IP protocol

     the Internet

     top-level domain

     topography

     types of

     UDP (user datagram protocol)

     UTP (unshielded twisted pair) cable

     WAN (wide area network)

     wireless

     workstations

Networks, controls

     ACLs (access control lists)

     alarms

     alerts

     architecture

     challenge-response systems

     content integrity

     cryptographic checksum

     design

     Digital distributed authentication

     encryption

         AH (authentication header)

         certificate authorities

         comparison of methods

         e-mail

         encrypted tunnels

         end-to-end

         ESP (encapsulated security payload)

         firewalls

         IKE (ISAKMP key exchange)

         ISAKMP (Internet Security Association Key Management Protocol)

         issues

         link

         overview

         PKI (public key infrastructure)

         security associations

         signed code

         SPI (security parameter index)

         SSH (secure shell)

         SSL (Secure Sockets Layer)

         TLS (transport layer security)

         tunnels

         VPNs (virtual private networks)

     error correcting codes

     error detection

     even parity

     failover mode

     failure tolerance

     firewalls

     hash codes

     honeypots

     Huffman codes

     implementation

     intrusion detection

     Kerberos

     mobile agents

     odd parity

     one-time password

     onion routing

     parity check

     password tokens

     redundancy

     router access controls

     segmentation

     single points of failure

     SSID (Service Set Identifier)

     strong authentication

     summary of

     threat analysis

     tickets

     TKIP (Temporal Key Integrity Program)

     traffic flow security

     WEP (wired equivalent privacy)

     wireless security

     WPA (WiFi Protected Access)

Networks, threats

     active code 2nd

     active wiretapping

     ActiveX controls

     anonymity

     application code errors

     ASP (active server pages)

     attackers

     authentication vulnerabilities

         avoidance

         eavesdropping

         guessing passwords

         man-in-the-middle attack

         masquerade

         nonexistent authentication

         phishing

         session hijacking

         spoofing [See also Man-in-the-middle; ; Masquerade.]

         trusted authentication

         well-known authentication

         wiretapping

     automatic exec by file type

     botnets

     bots

     broadcast mode

     buffer overflow

     bulletin boards

     cable

         eavesdropping

         impedance

         inductance

         wiretapping

     challenge motive

     chats

     complex attacks

     connection flooding

     cookies

     cyberterrorism

     DDoS (distributed denial of service)

     defacing web sites

     distributed authentication

     DNS attacks

     DNS cache poisoning

     documentation availability

     DoS (denial of service)

     dot-dot-slash directory travel

     dumpster diving

     eavesdropping

     echo chargen

     escape-character attack

     espionage

     exposing messages

     falsifying messages

     fame motive

     format failures

     hactivism

     hostile applets

     ICMP (Internet Control Message Protocol)

     ideological motive

     iishack problem

     impersonation

     implementation flaws

     in mobile code

     intelligence gathering

     Java code

     JVM (Java virtual machine)

     malformed packets

     message confidentiality

     message integrity

     microwave

     misdelivering messages

     money motive

     motives for attacks

     multiple points of attack

     multiplexed signals

     noise

     optical fiber

     organized crime

     packet sniffers

     passive wiretapping

     ping of death

     port scans

     protocol failures

     protocol flaws

     reconnaissance

     replaying old messages

     RFC (Request For Comment)

     rogue access points

     sandbox

     satellite

     script kiddies

     scripts

     server-side includes

     sharing

     smurf attack

     social engineering

     SYN flood

     system complexity

     system fingerprinting

     teardrop attacks

     traffic flow analysis

     traffic redirection

     transmission failure

     unknown path

     unknown perimeter

     vulnerabilities

     vulnerabilities, summary of

     war driving

     web site vulnerabilities

     wireless

         eavesdropping

         interception

         rogue access points

         theft of service 2nd

         vulnerabilities

         war driving

         wiretapping

     wiretapping

     zombies

New Zealand Herald

NICs (network interface cards)

NIST (National Institute of Standards and Technology)

nmap scanner

Nodes, network

Noise, in communications

Nondeterminism

Nondeterministic Turing machines

Nonexistent authentication

Nonhierarchical security policies

Nonmalicious errors [See also Malicious code; Programs, security.]

     buffer overflows

     causes of failures

     combined flaws

     incomplete mediation

     synchronization

     time-of-check to time-of-use errors

Normative versus pragmatic organizations

NP class

NP-complete problems

NRC (National Research Council)

NSA (National Security Agency) 2nd 3rd

Nuclear weapons, tracking

Nucleus [See Kernel.]

Number of iterations

Number theory 2nd

Категории