Index

A Nation Online report, 238, 239

A&M Records v. Napster, Inc., 254, 366367

Abelian groups, 536, 559

baby-step/giant-step method in, 566567

generic attacks in, 565, 566

Abolitionists, anonymity of, 268

Abortion rights, 302

online hate speech and, 249250

Aborts, 118

Academic research papers, trafficking and, 448

Acceptability principle, 797

Acceptable use policy (AUP), 44, 46, 465

Acceptance testing, 894

Access. See also Code division multiple access (CDMA); Illegal access; Media access control (MAC); Record accessibility/retention requirements; Time division multiple access (TDMA)

under the Computer Fraud and Abuse Act, 190, 191

copying versus, 446

in covering up after attacks, 56

fair use and, 448449

information practices and, 338

in Safe Harbor Compliance, 326

taxonomy of, 69

technological measures to control, 446447

trafficking and, 448

UN definition of, 243

unauthorized, 129130

under USA PATRIOT Act, 197

wireless network, 72, 73

by worms, 55

Access control

data-oriented, 799800

under Gramm-Leach-Bliley Act, 134

under HIPAA, 137

in operating system security, 796

role-based, 814

user-oriented, 799

Access Control Elements (ACEs), 863

Access control lists (ACLs), 800, 851

openVMS, 863

UNIX, 814

Access matrix, 799, 800

Access permissions, W2K, 876877

Access points (APs), 72, 74, 75, 83

vulnerabilities via, 24

Access rights, file sharing and, 801802

Accidental encounters, cyberstalking and, 4041

“Accidental privacy spills,” 415

Account aging, Linux, 846

Account timeouts, ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.