Index

Page references followed by italic t indicate material in tables.

A5/1 algorithm, 105

Access Control Lists (ACLs), 125

access controls, 122125

mandatory, 126

access tokens, 145147

active cryptographic protocol attacks, 114

ActiveX, 165166

malware susceptibility, 159

Acxiom, 19

ADT Security Services, 386

Advanced Encryption Standard, See AES

adversaries. See also each term as a main index heading

hackers, 4346

industrial espionage, 4950

infowarriors, 5658

lone criminals, 4647

malicious insiders, 4749, 265266

national intelligence organizations, 5456

organized crime, 5051

police, 5153

press, 50

risk tolerance, 4243

terrorists, 5354

AES, 118

described, 89, 100

as hacking contest, 348

Alberti, Leon Battista, 88

airline accidents, greater visibility of relative security debacles, 391

Air Safety Reporting System, 391

AirTran, Web site hack in 1997, 37

Alibris, 49

AlterNIC, Network Solutions traffic redirect attack/protest, 181

American military, See United States military

analysis

of attacks, 376377

fault, 218, 221

traffic, 3435, 362

AND nodes, 320

and defense in depth, 370

annual loss expectancy, 301302

anomaly detection, 196197

anonymity, 6367

antitampering devices, 216

antivirus software, 153154, 157158

at firewall, 201

application gateways, 192

Applied Cryptography, xxii, 394

Ariane 5 rocket mishap, 202203

artificial intelligence, 362

assessment, of attacks, 376

assurance, 363, 373

asymmetric key encryption, 95. See also public-key encryption

and PGP ...

Get Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.