Index
A Nation Online report, 238, 239
A&M Records v. Napster, Inc., 254, 366–367
baby-step/giant-step method in, 566–567
Abolitionists, anonymity of, 268
Abortion rights, 302
online hate speech and, 249–250
Aborts, 118
Academic research papers, trafficking and, 448
Acceptability principle, 797
Acceptable use policy (AUP), 44, 46, 465
Acceptance testing, 894
Access. See also Code division multiple access (CDMA); Illegal access; Media access control (MAC); Record accessibility/retention requirements; Time division multiple access (TDMA)
under the Computer Fraud and Abuse Act, 190, 191
copying versus, 446
in covering up after attacks, 56
information practices and, 338
in Safe Harbor Compliance, 326
taxonomy of, 69
technological measures to control, 446–447
trafficking and, 448
UN definition of, 243
under USA PATRIOT Act, 197
by worms, 55
Access control
under Gramm-Leach-Bliley Act, 134
under HIPAA, 137
in operating system security, 796
role-based, 814
user-oriented, 799
Access Control Elements (ACEs), 863
Access control lists (ACLs), 800, 851
openVMS, 863
UNIX, 814
Access permissions, W2K, 876–877
Access points (APs), 72, 74, 75, 83
vulnerabilities via, 24
Access rights, file sharing and, 801–802
Accidental encounters, cyberstalking and, 40–41
“Accidental privacy spills,” 415
Account aging, Linux, 846
Account timeouts, ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.