Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Walk-through, code

WAN (wide area network)

War driving

Ware committee report

Ware, Willis

Warranty of cyberworthiness

Watermarking

Weak keys, DES

Weak passwords

Weakest link principle

Weakest point

Weakness [See Risk analysis; Risks; Threats; Vulnerabilities.]

Weaknesses

Web bugs 2nd

Web servers, escape-character attack

Web sites [See also Internet.]

     content, legal issues

     defacing

     posting privacy policies

     privacy

         advertising

         adware

         contests

         cookies

         credit card payments

         drive-by installation

         highjackers

         keystroke loggers

         offers

         online environment

         online profiling

         payment schemes

         payments online

         precautions

         registration

         shopping

         site ownership

         spyware

         third-party ads

         third-party cookies

         web bugs

     privacy controls, commercial

     privacy controls, government

     tracking usage

     vulnerabilities

Well-formed transactions

Well-known authentication

WEP (wired equivalent privacy)

White-box testing

Wide area network (WAN)

WiFi [See Wireless.]

WiFi Protected Access (WPA)

Wild cards

Wilshire Associates, e-mail theft

Windows, distributed authentication

Windows, multilevel databases [See also Views.]

Wireless networks

     description

     eavesdropping

     interception

     rogue access points

     security

     theft of service 2nd

     vulnerabilities

     vulnerabilities, case study

     war driving

     wiretapping

Wiretapping 2nd

Woods, Alan

Word, deleting text

Work for hire

Workstations

World War II case studies

     ASINTOER code

     Enigma code machine

     Japanese codes

     poem codes

     silken codes

     Soviet Union codes

Worms [See also Malicious code; Viruses.]

     Code Red 2nd

     definition

     Internet worm

WPA (WiFi Protected Access)

Write-down

Категории