Index

3DES, see triple DES

3GPP

3rd Generation Partnership Project

see 3GPP

A3/A5/A

access control

and operating system

access control list, see ACL

access control matrix

ACK scan

ACL

Address Resolution Protocol, see ARP

Address Space Layout

Randomization, see ASLR

Adleman, Leonard

Adobe

eBooks

Advanced Encryption Standard, see

AES

AddRoundKey

block size

ByteSub

confusion and diffusion

key length

key schedule

MixColumn

number of rounds

ShiftRow

subkey

AFS Software, Inc.

AH

and Microsoft

Ali Baba’s Cave

Alice

Alice’s Restaurant

Almes, Guy

Amis, Kingsley

Anderson, Ross

anomaly detection

anonymity

anti-debugging

anti-disassembly

Apple II

application layer

Aristophanes

Aristotle

ARP

cache poisoning

ASLR

asymmetric cryptography

ATM

card

machine

attack tree

authentication

and TCP

two-factor

Authentication Header, see AH

authorization

availability

avalanche effect

Aycock, John, xviii

backdoor

Ballantyne, Sheila

Bell-LaPadula, see BLP

Biba’s model

low water mark policy

write access rule

Biham, Eli

biometric

attack

authentication

enrollment phase

equal error rate

error rate

errors

fingerprint

fraud rate

hand geometry

ideal

identification

insult rate

iris scan

recognition phase

birthday paradox, see birthday

problem

birthday problem

and hash functions

block cipher

bit errors

cut-and-paste attack

design

modes of operation

round function

Blowfish

S-box

BLP

simple security condition

star property

strong tranquility

system Z

weak tranquility

BMA, see British Medical Association

Bob

Bob’s ...

Get Information Security: Principles and Practice, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.