Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

UCC (Uniform Commercial Code)

UDP (user datagram protocol)

Unauthorized access

Undefined opcodes

Unexpected behavior

Uninterruptible power supply (UPS)

Unit testing 2nd [See also Testing.]

United Kingdom

     cost of security incidents

     RIPA (Regulation of Investigatory Powers Act)

United States

     California Breach Act

     CAN SPAM Act

     Census Bureau

     Computer Fraud and Abuse Act

     Economic Espionage Act

     Electronic Communications Privacy Act

     Electronic Funds Transfer Act

     evaluating trusted systems 2nd

     Freedom of Information Act

     GLBA (Graham-Leach-Bliley Act)

     government

         audit data overload

         security report card

     HIPAA (Health Insurance Portability and Accountability Act)

    laws [See Laws, U.S..]

     Patriot Act

     Privacy Act

     privacy principles and policies

Universality of ethics

Universities, as prime targets

Unknown path

Unknown perimeter

Unshielded twisted pair (UTP) cable

Upper bound

UPS (uninterruptible power supply)

URLs, legal issues

Usage controls on cryptography

Use of computer services, ethical issues

Usefulness

User authentication [See also Authentication.]

     additional authentication information

     biometrics 2nd

     challenge-response system 2nd

     cookies

     databases

     flaws

     impersonating trusted systems

     impersonation of login

     multifactor authentication

     one-time passwords

     overview

     password attacks

     password selection criteria

     passwords as authenticators

     phishing

     principles of trusted systems 2nd

     process description

     single sign-on

     two-factor authentication

     versus identification

User datagram protocol (UDP)

User interests

User interface vulnerability

User-group-world protection

Users

     human fallibility case study

     security policies

     security responsibilities

Utilitarianism

UTP (unshielded twisted pair) cable

Категории