Index
Page references followed by italic t indicate material in tables.
A5/1 algorithm, 105
Access Control Lists (ACLs), 125
mandatory, 126
active cryptographic protocol attacks, 114
malware susceptibility, 159
Acxiom, 19
ADT Security Services, 386
Advanced Encryption Standard, See AES
adversaries. See also each term as a main index heading
malicious insiders, 47–49, 265–266
national intelligence organizations, 54–56
press, 50
AES, 118
as hacking contest, 348
Alberti, Leon Battista, 88
airline accidents, greater visibility of relative security debacles, 391
Air Safety Reporting System, 391
AirTran, Web site hack in 1997, 37
Alibris, 49
AlterNIC, Network Solutions traffic redirect attack/protest, 181
American military, See United States military
analysis
AND nodes, 320
and defense in depth, 370
annual loss expectancy, 301–302
antitampering devices, 216
antivirus software, 153–154, 157–158
at firewall, 201
application gateways, 192
Applied Cryptography, xxii, 394
Ariane 5 rocket mishap, 202–203
artificial intelligence, 362
assessment, of attacks, 376
asymmetric key encryption, 95. See also public-key encryption
and PGP ...
Get Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.