Index

AAFID architecture, 734. See also Autonomous Agents for Intrusion Detection (AAFID)

AAFID intrusion detection system, 730

Abnormal network activities, detecting, 688

Abstract service interfaces, SNMPv3, 900

Abstract stack model, 690

Abstraction-based intrusion detection, 693694

Abuse, information asset security and, 280

Accelerators, high-performance cryptographic, 323

Acceptable business practices, with spyware, 141

Acceptable use. See also Acceptable use policy (AUP)

of e-mail, resources, and facilities, 50

of Internet, 28

physical security and, 277278

of resources, 2728

Acceptable use policy (AUP), 52, 277

client-side security and, 352353

Access. See also Access control; Physical access; Wi-Fi protected access (WPA); Wireless protected access (WPA)

with Ajanta system, 150

Bluetooth, 190

to company e-mail, resources, and facilities, 50

controlling physical, 266270

to health records, 398

to information assets, 265266

by insider criminals, 8

MAC address-based, 200

for medical record security, 401

rights management and, 867868

spyware and, 141

theft as unauthorized, 26

unauthorized/inappropriate, 28, 166

unintended, 312

via Trojans, 43, 44

Access blocking, Internet and communications, 862

Access cards, 566, 569

Access classes, in mandatory access control, 384

Access codes, 1045

with Bluetooth, 186

Access control, 177, 303, 392, 406423, 435, 441, 968. See also AccessController

agent-oriented, 156157

Apache, 417420

certificate-based, 363

compile-time, 386

context-dependent, ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.