Index
AAFID architecture, 734. See also Autonomous Agents for Intrusion Detection (AAFID)
AAFID intrusion detection system, 730
Abnormal network activities, detecting, 688
Abstract service interfaces, SNMPv3, 900
Abstract stack model, 690
Abstraction-based intrusion detection, 693–694
Abuse, information asset security and, 280
Accelerators, high-performance cryptographic, 323
Acceptable business practices, with spyware, 141
Acceptable use. See also Acceptable use policy (AUP)
of e-mail, resources, and facilities, 50
of Internet, 28
physical security and, 277–278
Acceptable use policy (AUP), 52, 277
client-side security and, 352–353
Access. See also Access control; Physical access; Wi-Fi protected access (WPA); Wireless protected access (WPA)
with Ajanta system, 150
Bluetooth, 190
to company e-mail, resources, and facilities, 50
to health records, 398
to information assets, 265–266
by insider criminals, 8
MAC address-based, 200
for medical record security, 401
rights management and, 867–868
spyware and, 141
theft as unauthorized, 26
unauthorized/inappropriate, 28, 166
unintended, 312
Access blocking, Internet and communications, 862
Access classes, in mandatory access control, 384
Access codes, 1045
with Bluetooth, 186
Access control, 177, 303, 392, 406–423, 435, 441, 968. See also AccessController
certificate-based, 363
compile-time, 386
context-dependent, ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.