Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

V.A. (Veterans Administration)

Validation

Validation errors

Value of data

Value of security [See Economics of cybersecurity.]

VAM (Vulnerability Assessment and Mitigation) 2nd

Vandalism

Varian, Hal

Vendor interests

Verifying program code [See Testing code.]

Verisign 2nd 3rd

Vernam cipher

Vernam, Gilbert

Version proliferation, databases

Views, multilevel databases

Vignère tableau 2nd

Virtual machines

Virtual memory

Virtual private networks (VPNs)

Virtualization

Virus scanners

Viruses [See also Malicious code.]

     appended to a program

     application programs

     attachment

     benign

     boot sector

     bootstrapping

     Brain

     Code Red

     cookies

     defense methods

     definition

     document

     e-mail attachment

     effects and causes

     gaining control

     homes for 2nd

     in read-only files

     infecting hardware

     integrated

     Internet worm

     libraries

     memory-resident

     misconceptions

     one-time execution

     platform limitations

     qualities of

     resident

     signatures

         definition

         execution patterns

         polymorphism

         scanners

         storage patterns

         transmission patterns

     source of

     spreading media

     surrounding a program

     surviving power off

     transient

     triggering

     web bugs

Voice recognition authentication [See Biometrics.]

VoIP (Voice over IP)

Voting, electronic

VPNs (virtual private networks)

Vulnerabilities [See also Attacks ; specific vulnerabilities.]

     data

     definition

     hardware

     laptop computers

     mapping to controls

     network threat 2nd

     risk analysis

     software

     versus threats

Vulnerability Assessment and Mitigation (VAM) 2nd

Категории