Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Rabbits

Radio frequency identification (RFID)

RAND Corporation 2nd

Random number sequences

Random sample control

Ranum, Marcus

RC2 cipher

RC4 cipher

RC5 cipher

RC6 algorithm

Read-only files, viruses

Realism

Rearrangement [See Permutations.]

Recipients

Reconnaissance

Records, database 2nd

Recovery from backup

Redaction Tool

Redundancy

     database reliability

     multilevel databases

     networks

     process comparison

Reference monitor

Refunds

Registration

     copyright

     patents

     web privacy

Regression testing

Regulation of Investigatory Powers Act (RIPA)

Regulation, economics

Relational operators

Relations, database

Relatively prime values

Release proliferation

Reliability

     databases [See also Integrity.]

         commit flag

         committing updates

         concurrency

         consistency 2nd

         correction codes

         data form checks

         definition

         error detection

         filters

         intent phase

         monitors

         operating system protection features

         patterns

         recovery from backup

         redundancy

         shadow fields

         shadow values

         state constraints

         transition constraints

         two-phase update

Religion, and ethics

Relocation

Relocation factor

Remailers

Remanence, magnetic

Repeaters, network

Replay attack

Reporting

     computer crime

     program flaws

Reprocessing used data items

Request For Comment (RFC)

Requirements checking

Requirements of novelty

Resident viruses

Resilience, network

Resorla, Eric

Respondent types

Response

     CERT (Computer Emergency Response Team)

     intrusion detection

     limited response suppression

     plans

     teams

     to alarms

Responsibility for security

Restricted content

Restricted usage

Results versus process organizations

Retina pattern authentication [See Biometrics.]

Return on investment (ROI)

Reverse engineering

Reviews, design and code

Revocation of access

Revolving backups

RFC (Request For Comment)

RFID (radio frequency identification)

.rhosts file

Right, versus wrong [See Ethics.]

Rights of employees and employers

     copyright ownership

     employee contracts

     licensed software

     patent ownership

     product ownership

     trade secrets

     work for hire

Rijmen, Vincent

Rijndael algorithm 2nd [See also AES (Advanced Encryption System).]

Ring of trust

RIPA (Regulation of Investigatory Powers Act)

Risk analysis [See also Security plan.]

     classical probability

     Delphi approach

     FMEA (failure modes and effects analysis)

     frequency probability

     FTA (fault tree analysis)

     hazard analysis techniques

     HAZOP (hazard and operability studies)

     IVAs (Integrated Vulnerability Assessments)

     nature of risk

     probability

     pros and cons

     steps involved in

         alternative steps

         asset identification

         control selection

         cost/benefit analysis

         expected loss computations

         exploitation estimation

         savings projections

         vulnerability identification

     subjective probability

     VAM (Vulnerability Assessment and Mitigation)

Risks

     definition

     exposure

     impact

     leverage

     nature of

     prediction [See also Risk analysis.]

Rituals, organizational

Rivest, Ron

Rivest-Shamir-Adelman (RSA) encryption [See RSA (Rivest-Shamir-Adelman) encryption.]

.rlogin file

Rochefort, Joseph

Rogue access points

Rogue programs [See Malicious code.]

ROI (return on investment)

Role-based access control

rootkit

Rootkit revealers

Rootkits

Roundoff error

Router access controls

Routers

Routing concepts

RSA (Rivest-Shamir-Adelman) encryption

     cryptanalysis of

     cryptographic challenges

     description

     Euler totient function

     Jacobi function

     key choice

     mathematical foundations

     overview 2nd

     using the algorithm

Rule-based ethics

Rule-deontology

Rules of evidence

Rules of property

Rules set, firewall

Russian nuclear weapons, tracking

Категории