Subject Index - Springer978-1-349-12209-7/1.pdf · ADAC adaptive channel allocation adaptive...

44
Al A&A aborted connection absolute rate abstract data type abstract syntax notation I AC acceptability principle acceptable level of risk acceptable risk acceptance acceptance inspection acceptance testing access access authorization access barred access card access category access control access control list access control measures access control mechanisms access control roster access group access label access level access line access list access matrix model access mode access password access period access permission access port access right access to information access type accidental destruction accidental threat accountability accountability information account balance account freezing Subject Index account identification account owner bank account servicing bank accreditation accreditation authority accreditation range accumulator circuit accuracy ACF2 ACH ACIA ACK ACKO ACKI acknowledge character acknowledgement acknowledgement frame ACM acoustic coupler acoustic eavesdropping acoustic emission acquired data acquirer activation active attack active sensor active threat active wire concentrator active wiretapping activity actual data transfer rate ACU ADAC adaptive channel allocation adaptive routing ADCCP add-in additive cipher add-on security address addressing address space ad hoc enquiry 577

Transcript of Subject Index - Springer978-1-349-12209-7/1.pdf · ADAC adaptive channel allocation adaptive...

Al A&A aborted connection absolute rate abstract data type abstract syntax notation I AC acceptability principle acceptable level of risk acceptable risk acceptance acceptance inspection acceptance testing access access authorization access barred access card access category access control access control list access control measures access control mechanisms access control roster access group access label access level access line access list access matrix model access mode access password access period access permission access port access right access to information access type accidental destruction accidental threat accountability accountability information account balance account freezing

Subject Index

account identification account owner bank account servicing bank accreditation accreditation authority accreditation range accumulator circuit accuracy ACF2 ACH ACIA ACK ACKO ACKI acknowledge character acknowledgement acknowledgement frame ACM acoustic coupler acoustic eavesdropping acoustic emission acquired data acquirer activation active attack active sensor active threat active wire concentrator active wiretapping activity actual data transfer rate ACU ADAC adaptive channel allocation adaptive routing ADCCP add-in additive cipher add-on security address addressing address space ad hoc enquiry

577

578 Subject Index

adjacent channel ADLC administratively directed access control administrative security ADP ADP availability ADP security ADP security documentation ADP security staff ADP system security advanced data communications control

procedure advanced data link control advice advice and assessment AFCEA Affirm affirmative acknowledgement AFIPS AFNOR AFR agency activity aggregation AGI aging AGI-Plan Aids AIM AirCop AIS AMAIS security Alabama Alameda alarm assessment system alarm discriInllnator alarm indicating device alarm line alarm receiver alarm screen alarm signal alarm station ALE algorithm Aloha alphabetic character set alphanumeric alternate route AM ambush code amend American National Standards Institute

amplitude modulation Amstrad analog analog channel analog signal analog transmission analysis analytical attack ancillary equipment anisochronous signal anisochronous transmission annual loss expectancy annunciator anonymous refunder ANSI ANSI X.12 ANSI X3.T1 ANSI X3.92 - 1981 ANSI X3.10S - 1983 ANSI X3.106 - 1983 ANSI X3.118 - 1984 ANSI X9.1 - 1984 ANSI X9.2 - 1980 ANSI X9.3 - 1981 ANSI X9.S - 1988 ANSI X9.7 - 1988 ANSI X9.8 - 1982 ANSI X9.9 - 1986 ANSI X9.9 ANSI X9.12 - 1983 ANSI X9.13 - 1983 ANSI X9.14 - 1983 ANSI X9.16 - 1984 ANSI X9.17 - 1985 ANSI X9.17 ANSI X9.18 - 1986 ANSI X9.19 - 1986 ANSI X9.20 - 1986 ANSI X9.21 - 1986 ANSI X9.22 - 1986 ANSI X9.23 - 1988 answer back answering Anthrax-Boot Anthrax-File anti-eavesdrop device anti-fixed point anti-jam anti-palindromic key anti-passback anti -surveillance

anti-viral measures AOSS API application confidentiality application disaster recovery plan application integrity application layer application process application program application program interface application software approval/accreditation approval to operate approved circuit a priori control AR Arab Virus arbiter arbitrated signature arc-breakdo~ protector architecture archive area mat area protection Armageddon arming station ARPA ARPANET ARQ array array processor arrest arrester artificial intelligence ARU AS 2805 AS 3801 - 1989 AS 3802 - 1989 AS 3803 - 1989 AS 3804 - 1989 AS 3805 - 1989 ASA ASCII ASET ASIS ASNI assembler assembly language asset Association for Computing Machinery associative law

Subject Index 579

assurance asymmetric algorithm asymmetric cipher asymmetric cryptosystem asymmetric key system async asynchronous asynchronous attacks asynchronous communications interface adaptor asynchronous transmission ATM attack attacker attack path attack signalling attention character attenuation attribute AT&T AU audible alarm device audio detection audio listen in audio response terminal audio response unit audit audit based control audit data audit expert auditing audit trail audit trail analysis authenticate authentication authentication algorithm authentication element authentication equipment authentication exchange authentication information authentication key authentication of users authentication period authentication process authentication sequence authentication server authenticator authenticator key authorization authorization code authorization level

580 Subject Index

authorization parameter authorization process authorized access control switch auto-alarming switcher auto answer autoclave auto dial auto dial modem autoidentifier automated audit Automated Clearing House automated error correction Automated Information System automated security monitoring automated system security automated teller machine automatic alarm initiating device automatic answering automatic calling automatic calling unit automatic capture Automatic Data Processing System automatic message switching center automatic personal identification automatic polling automatic renewal clause automatic retransmission request automatic teller machine automation security auto restore auxiliary equipment auxiliary fire alarm system availability availability-automated security

monitoring available funds available time AVLOS

Bl B2 B3 babble backdoor background job backing storage back office backtracking backup plan backup procedures backup/restore

backward channel backwards learning backward supervision BACS badge reader balanced circuit balanced detection balanced transmission balancing band bandpass bandscrambler band shift invertor bandsplitter bandwidth bank bank camera Bankers Automated Clearing Services banking cycle banking networks bank to bank information BankWire base baseband baseband modem baseline baseline security controls basic mode link control basic security theorem basic service batch balancing batched communication batch total baud baudot code BBS BCC BCD BCF BCP BDN BDSG beam break bearer BeBe Beeper bel Bell 103 Bell 212A Bell Data Network

Bell-La Padula model Bell-La Padula beneficiary Berlekamp-Massey algorithm Best Wish beta testing between-the-lines entry bias biased Biba model bid bigram bijection bimetallic-type heat detector binary binary arithmetic binary code binary coded decimal binary digit binary license binary number binary symmetric source binary synchronous communications binding analysis binding of functionality biometrics bipolar birthday problem bistatic microwave sensor BISYNC bit bit copier bit interleaving BITNET bit oriented protocol bit parallel, byte serial bit rate bit sequence independence bit sequence transparent bits per inch bits per second bit stream bit string bit stuffing black blacklist Black Monday blackout blind dialing blob block

block cancel character block character check block cipher block cipher chaining block error rate blocking law

Subject Index 581

block mUltiplexer channel block parity blocksize block sum check Bloody Blood-2 Blue Book BNC connector body print book transfer boolean algebra boolean operator Boot boot sector virus bounds checking bounds register Brain Brain Slayer breach break breakable break alarm brevity lists Brewer-Nash bridge bridging sequential switcher British Standards Institution British Telecom broadband broadcast bromochlorodifluoromethane brownout browsing BRP BSC BSI BT BTLE The Buddy System buffer buffered network bug building security systems bulletin board Bundesdatenschutzgesetz

582 Subject Index

Bundespost Burger burglar alarm pad burglary buried-line intrusion pad bum mark burst bus business resumption planning bussback byte byte cipher feedback byte control protocol byte mode byte multiplexer channel byte serial transmission

Cl C2 C2 by 92 caboose Caesar cipher call call accepted signal call back call control character call control procedure call control signal call not accepted signal call progress signal call redirection call request Cambridge Ring call back CAN cancel call cancel character cancellation Cancer candidate key candidate TCB Subset capability capability list capacitance sensor capacitively coded card capture card acceptor card based mode card encoder card holder card identification code

card issuer card key card mastering card reader card verification value Carioca carrier carrier detect carrier sense multiple access - collision

detection carrier sense protocol carrier system Cascade cash dispenser cash highway CashWire Casino Casper category caution statement CB CBC CBMS CBX CCA CCEP CCETI CCIR CCIIT CCR CCTA CCTV CCU COl cell restriction cell suppression cellular radio cellular radio central computer facility centralized adaptive routing centralized computer network central processing unit central station Central Station Electrical Protection

Association CEPT CERT certificate certificate identifier certificate revocation list certi fication

certification authority certification body certification path Certified Protection Professional challenge/response CESG CFB chaining challenge and reply authentication challenge/response channel channel bank channel capacity channel isolation channel overload Chaos Chaos Club CHAPS character character assembly character code character disassembly character interleaving character mapping character oriented protocol characterplexer character set characters per second character stuffing character subset character terminal charges check bit check digit check key check kiting checkpoint checkpoint restart checksum chime Chinese Remainder Theorem Chinese Theorem Chinese Wall model chip card chip modem CHIPS chosen cryptogram attack chosen plaintext Christmas-J Christmas Violater CI

CIA cipher cipher block cipher block chaining cipher feedback cipher system ciphertext

Subject Index S83

ciphertext key auto-key cipher ciphertext only ciphertext searching ciphertext stealing circuit circuit hoard circuit grade circuit noise level circuit switched digital circuitry circuit switching circumvention Cirrus CISA CKDS Claims Language Clark Wilson model Class A alarm system Class A fire Class B alarm system Class B fire Class C fire classification classification level classified computer security program classified data/information class of service CLC cleanroom approach clearance clearance level clear data cleared funds clearing clearing ADP media cleartext cleartext operation clear to send clear zone CLEF clocking CLODO closed circuit alarm closed circuit television closed environment

584 Subject Index

closed hot site closed security environment closed shop closed user group cluster cluster controller cluster control unit clutch head screw CNIL CNP CNPDPI COAM coaxial cable CoCom code code analysis code book CODEC code conversion coded alarm system coded character set coded key coded system code extension character code independent system code level code review code scrambling circuit code set code system code value coerci ve force coercivity cold site cold standby cold start collusion Colossus combination smoke detector combinatorics combined alarms combined station COMINT Comite Consultatif Intemationale de

Telegraphie et Telephonie Commercial COMSEC Endorsement

Program commercial licensed evaluation facility commit common carrier common cryptographic architecture

communicating pair communication communication channel communication link communication processor communication scanner communications computer communications control unit communication server communication service communications link controller communications medium communications network processor communications security communication theory commutative law compartment compartmentalization compartmented security mode compatibility compiler complement complete mediation completeness check complete set of residues complexity complexity analysis compliance testing component component reference monitor composite compromise compromising emanations COMPUSEC computationally infeasible computationally secure computationally strong computer computer abuse computer audit enquiry packages computer audit packages computer based message system computer bureau computer crime Computer Emergency Response Team computer facility computer fraud control computer inquiry 1980 computerized branch exchange computer matching Computer Misuse Act 1990

computer network computer security Computer Security Act of 1987 Computer Security Act of 1988 computer security incident computer security plan computer security specialist computer security subsystem computer software quality computer virus COMSEC concealment system concentrator conceptual design conditioning conductive radiation conductive shielding Confidential confidential clearance confidentiality configurably dumb terminal configuration control configuration management confinement confinement channel confinement property confirmed service confusion congruent connection connectionless service connection oriented service consistency console constant ratio code constrained data item construction vulnerability contactless smart card contained container container clearance required contamination content dependent access control contention contention control contention delay context dependent access control contingency management contingency plans contingency program continuity check

Subject Index 585

continuity of operations continuous synchronization continuous wave control cabinet control character control flow analysis controllable isolation controlled access controlled access area controlled accessibility controlled area controlled rounding controlled security mode controlled sharing controlled space controller control mode control panel control station control token control vector control zone Convention on Mutual Administrative

Assistance in Tax Matters conversation converter cookie monster Co-ordinated Universal Time coprime coprocessor copy protected copy protection copyright cord trap core coroutine corporate security policy corrective maintenance correctness correctness proof correct refinement correspondent banks corrupt data corruption cost-risk analysis COTS counter countermeasure counterparty counterparty group counterparty risk

S86 Subject Index

country of domicile country of residence cover payment covert covert channel cover time covert storage channel covert timing channel CPP CPU cracker CRAMM crash crasher CRC credentials credit advice credit card credit party credit risk criteria critical data processing workload critical functions criticality critical processing critical technology CRL cross alarm crossfire cross-talk cross zone cryptanalysis cryption cryptogram cryptogram space cryptographic algorithm cryptographic API cryptographic authentication cryptographic bit stream cryptographic checkfunction cryptographic checksum cryptographic checkvalue cryptographic control cryptographic device cryptographic equipment cryptographic facility cryptographic key cryptographic key data set cryptographic keying material cryptographic period cryptographic seal

cryptographic service message cryptographic system cryptographic throughput factor cryptographic transparency cryptographic variable cryptography crypto-key cryptology cryptomanagement crypto-operation cryptoperiod cryptosystem cryptotext CSDC CSM CSMA-CD CSTVRP CTS CUG current utilization Curse Boot custodian of data customer customer code customer type cutoff frequency CVV cyclical band shift invertor cyclic code cyclic redundancy check

D DAA DAC daemon daisy chain Dark Avenger DARPA dasd data data above voice data access arrangement data access management data acquisition databank database administrator database language database management system database security Fig 1 database security data bits

data bus coupler data capture data carrier detect data cell data chain data channel data circuit data circuit terminating equipment data collection data communications data compression data confidentiality data connection data contamination data corruption data coupler Datacrime Datacrime-B Datacrime II Datacrime II-B data-dependent protection data description language data dictionary data diddling data element data encrypting key data encryption algorithm data encryption standard data exchange data flow analysis data flow control data frame datagram datagram service data haven data independence data input voice answerback data integrity data in voice data item data keeper data key data leakage data level data link data link control data link control standard data link encryption data link layer DataLock data management

Subject Index 587

data manipUlation language data mining data modelling data modification data origination data origin authentication data owner dataplex dataplug data processing data protection data protection - Australia data protection - Austria data protection - Belgium data protection - Canada data protection - Council of Europe data protection - Cyprus data protection - Denmark data protection - EC data protection engineering data protection - Finland data protection - France data protection - Germany data protection - Greece data protection - Guernsey data protection - Iceland data protection - Ireland data protection - Isle of Man data protection - Israel data protection - Japan data protection - Jersey data protection - Luxembourg data protection - Netherlands data protection - New Zealand data protection - Norway data protection - OECD data protection - Portugal data protection - Slovenia data protection - Spain data protection - Sweden data protection - UK data protection - USA data rate data reduction data retrieval Data Seal data security data security architecture data security officer data security package data set

588 Subject Index

data set ready data signalling rate data signalling rate selector data sink data source data station data stream data structure data subject data switching exchange data terminal equipment data terminal ready data transfer rate data transmission data transparency data transport system data type data under voice data user data validation data word data word size date of message origination date/time stamp Day-Night switch db DBA Dbase DBMS DCI DC4 DCD DCE DCm DDL DDN DDP DDS DEA DEA I DEA2 DEA device deadlock dead zone deal debit advice debit card debit party debit transfer debug debugger

decentralized computer network decibel decimalization table decipher decipherment decision support system declarative language declassification of magnetic storage media decode decoder decoupling key decrypt decryption dedicated dedicated access dedicated channel dedicated mode dedicated security mode DEE default default classification default to denial of access defeat Defense Data Network defense industry information defensive depth degauss degausser degradation degree of trust DEK DEL delay circuit delay/denial of service delay distortion delay equalizer delay line delay vector delegate delete character deliberate threat delimiter deliverable delivery assurance delta modulation delta routing demand mUltiplexing demarcation strip democratic network demodulation

demodulator demon demultiplexing denial denial of message service denial of service dense index Den Zuk dependability dependence derived PIN DES descriptive top-level specification descriptor designated approving authority design standard design verification desk checking despotic network destruction. destructive readout Destructor detector deterrent development center device assignment device control Devil's Dance DFT scrambler DGP DGT DG XIII diagnostic code diagnostics dial access dial back dialer dial up control DIANE dibit dictionary attack differential PCM Diffie Hellman technique diffuse risk from adversarial sources diffusion digital digital bit pipe digital communicator digital dialer digital distributed system security

architecture

Subject Index 589

Fig 1 hierarchy of CA's digital enveloping digital keypad digital multiplex switching system digital signal digital signalling digital signature digital signature standard digital switching digital transmission system DIN dip lex operation direct access direct data access arrangement direct debit directly connected transaction direct memory access directory directory routing Dir-Vir DIS disaster disassembler disaster plan disaster planning disaster recovery manual disaster recovery plan disclosing disclosure disclosure risk disconnect service message discrepancy reports discrete Fourier transform scrambler discrete logarithm problem discretionary access control discretionary processing discretionary protection discretionary security discretionary security policy disgruntled employee dishonest employee disjoint disk crash disk drive diskette Disk Killer disk pack disk server dissemination distortion distributed adaptive routing

S90 Subject Index

distributed database distributed data processing distributed function distributed network distributed processing distributive law DIV DIVA division Division A Division B Division C Division D DMA DML DMS document cycle DOD DODCSC DODD DOD Information Analysis Center DOD security criteria DOD Technology Transfer DOD 520028-STD DOE domain dominate DON dongle Do-Nothing Doom2 Dot Killer double circuiting double drop double supervised system down line load download downtime DP DQDB DR/AS draw down drop DSA DSE DSM DSO DSR DSS DSV DTE

DTI DTLS dual control dual key dual redundancy dual use system dumb device dumb terminal dump dumpster diving duplex duplex circuit duress alarm DUV dwell time dynamic analysis dynamic password dynamic signature verification dynamic testing

EO El E2 E3 E3 E4 E5 E6 EAPROM EAROM eavesdropping EBCDIC code ECB ECC ECCM echocheck echoplex echo suppressor ECM ECMA ECOMA economic assessment economy of mechanism ECSA EDAC EDI EDIFACT EDI security edit editing run EDP

EOP auditor EOP controls EOV EEFI EEPROM EEPROM security EEROM EFF effectiveness E field EFT EFTPOS EFTS EIA EIN electrically alterable ROM electrically erasable ROM electrically programmable read only

memory electrical metallic tubing electric field sensor electromagnetic emanations electromagnetic emissions electromagnetic interference electronic blackboard electronic codebook electronic coin electronic countermeasures sweeping electronic data interchange electronic data processing electronic digital computer electronic eavesdropping electronic filing electronic frontier foundation electronic funds transfer electronic funds transfer point of sale Electronic Industries Association electronic listening device electronic mail electronic mailbox electronic mail security electronic messaging electronic piggybacking electronic publishing electronic purse electronic signature electronic system for payments electronic token electronic vaulting electronic vibration detector electronic wallet

Subject Index 591

electrostatic field sensor element EIGamai cipher EIGamal digital signature emanation emanation security embedded audit embedded system embezzlement embossed card emergency plan emergency response emergency response plan EMIIRF radiation EMIIRF shield emission security Empire employee monitoring empty slot EMS EMT emulator encapsulation encipher encipherment encode encrypt encryption encryption algorithm encryptor board end of address end of block end of file end-of-line resistor end of line supervision end of message end of text end of transmission Endorsed Tempest Products List endorsement end-to-end assurance end-to-end control end-to-end encipherment end-to-end encryption end user end user computing end user device enhanced services Enigma Enigma machine ENQ

592 Subject Index

enquiry character enrolment entity entity identifier entrance delay entrapment entropy entry entry date envelope environment EOA EOB EOF EOM EOT EPL EPOS EPROM equal error rate equalization equipment check equivocation erasable programmed read only

memory erasable storage erasure EROM error error burst error condition error correction code error detection code error extension error message error propagation error rate error recovery service message error service message error source statistics ERS ESC escape character escape code escorts escrow agent ESM espionage essential elements of friendly

information essentiality

Estelle State Transition Language Ethernet ETPL ETR ETX Euclid's algorithm Euler's Generalization Euler totient function Euronet European Informatics Network Evaluated Products List evaluation evaluation technical report evaluator EVD even parity event code event sequence analysis exchangeable disk storage EXCLUSIVE OR execute protection executive state exhaustive attack exit button expander board expansion board expansion card expert systems expired password Exploitable channel exploitable vulnerability exponent exponentiation exponentiation cipher Export Administration Act of 1979 exportation exposure expression extension external auditor external data file external interrupt external label external schema external security audit external timing eye retina analysis

facilities management facility facility code

facility line facility type facsimile factor factoring fail safe fail secure fail soft failure access failure control fall back false acceptance rate false rejection rate false solution family FAR fast connect circuit switching fast data encipherment algorithm Father Christmas father file fault fault diagnosis fault tolerance fault trace fault tree F-AV F-Bl F-B2 F-B3 FC F-Cl F-C2 FCAP FCC FC-FIPS FD F-DC F-OI FDM FDX F-DX FDOI FEAL FEC Federal Communications Commission Federal Criteria federal funds Federal State Joint Board FedWire Feistel cipher Fellowship

FEP Fermat prime Fermat's Theorem fetch protection Fiat Shamir algorithm fiber crosstalk

Subject Index 593

fiber distributed data interface fiber optics field field data code field separator field tag FIFO file file access file authentication code file cleanup file conversion file descriptor file layout file lock file maintenance file management filename file organization file processing file protection file protect ring file restructuring file security file server file storage file system check file tidying file transfer, access and management file updating fill character filter filtering FIMAS F-IN fmancial institution financial message fmgerprint fingerprint analysis FINS FIPS FIPS PUB FIPS Pub 65 fire walls firmware

594 Subject Index

first in first out first normal form Fish-6 FlU fixed and exchangeable disk storage fixed disk storage fixed head disk fixed length record fixed point fixed routing flag flag bit flag code flag sequence Flash flat file flaw flaw hypothesis flaw hypothesis methodology flexibility Flip flooding flood testing floor sensor floppy floppy disk floppy disk drive flops flow analysis flow control flying dutchman flywheeling FM FNF FNP FOI foil forbidden combination foreground program Foreign Government Information forgery Form formal formal access approval formal language formal proof formal security policy model formal top-level specification formal verification formant format

formatted dump formatting form mode terminal formulary For Official Use Only Data FORTRAN Fortran Complexity Analysis Program forward channel forward error correction forward supervision FOUO four eyes fourth generation language four wire circuit frame frame relay frame switching framing framing bit framing pattern fraudulent retailer FRC FRD freedom of information french roundoff frequency agility frequency division multiple access frequency division multiplexing frequency modulation frequency multiplexing frequency shift keying frequent buyer Frere Jacques Friday 13th Frogs front end network processor front end processor front-end security filter front office FRR FS fsck FSK FTAM FTLS FTP full duplex fully connected network fully distributed costs fully functional dependent Fu Manchu

functional dependence functional group functional testing funds transfer funds transfer transaction funds type fuzzy sector technique F-Word

G galactic Galois field GAO garbage garbage collection garbage in garbage out garble extension gateway Gaussian distribution GCD general purpose general purpose computer General Services Administration generation genuine geophone GF(p) Ghost Boot Ghost COM GHz GIDEP giga GIGO GlSA global GMT go back n good value GOSIP graceful degradation grade A central station grade AA central station grade B central station grade of service Graham Shamir knapsack cipher grammar grandfather file granularity graphic annunciator Gray code greatest common divisor

Subject Index 595

Greenwich Mean Time grid sensor group grouping GSA GSIS guard guard band guarding Guardwire Guillou-Quisquater Guppy Gypsy

hacker hack hack half duplex halon system Hamming code hand geometry analysis handled by handler handling caveats handling restrictions Hanover Hacker handshaking handshaking procedure Happy Day Happy New Year hard disk hard error hardware hardware handshaking hardware interrupt hardware redundancy hardware security hardwired harmful event harmonized criteria hartley hash function hashing hash total hatbox Hayes hazard HD HDLC HDM HDX head crash

S96 Subject Index

header header label heap heat detector help hertz heterogeneous computer network heterogeneous multiplex heuristic hex hexadecimal hico hidden files hidden object hidden sections hierarchical computer network hierarchical database hierarchical decomposition hierarchical development methodology hierarchical directory hierarchical network high coercivity high coercivity card high energy media high level data link control high level language high level protocol high speed high speed multiplex link hit hit on the line Holocaust hologram home banking home banking security homerun homing sequential switcher homogeneous computer network homogeneous multiplex horizontal parity host host access control host computer hostile threat environment hot card list hot file hot mode hot potato routing hot site hot standby housekeeping

housekeeping information hub polling Huffman code human interface functions Hybrid hybrid redundancy Hymn Hymn-2 Hz

1-4 I&A lAS lAC IBAC IC Icelandic ICV ID IDA IDE identification identification and authentication identification character identification risk identifier identifier code identity identity authentication identity based access control identity based security policy identity token identity validation IDES idle character idle time IDS IDU IEC lEE IEEE IEEE 802 IEEE 8023 IEEE 8024 IEEE 8025 IEEE 8026 IERE IFIP I Inf Sc lIS IK

IKV528 illegal character immediate funds IMP impact impact analysis impartiality impersonation implementation implementation verification implied queries control impulsive noise inadvertent disclosure Ina ]0 Formal Development

Methodology in band signalling incoming message incoming traffic incomplete parameter checking Independent Verification and Validation index index build indexed file indirect access indirectly connected transaction individual accountability induced interference inertia sensor inference inference control infinity informatics information information asset security information bearer channel information center information content information flow analysis information flow control information hiding information integrity information loss information management information networks information rate information redundancy information resources management information retrieval information security information system information system abuse

Subject Index 597

information systems director information systems security information technology information technology facility information technology security

evaluation criteria information technology security

evaluation facility information technology security

evaluation manual information theory INFOSEC infra red motion detector initialization vector initializing variable initial program load initial synchronization initiator input data validation input device input output channel input output device input output interface input output statement input output unit input unit inquiry/response insertion loss inside perimeter installation time install-deinstall instructing bank instructing party instruction instruction format instruction repertoire instruction set INTAMIC integer integral controller integrated circuit integrated database integrated digital network integrated modem integrated optical circuit integrated services digital network integrity integrity check value integrity level integrity locking integrity policy

598 Subject Index

integrity validation procedure intelligence intelligent card reader intelligent device intelligent disk server intelligent knowledge based system intelligent terminal intelligent token intelligible cross talk interactive interactive computing interactive videotex intercept interceptability interchange interchange group interchange key interchange transaction interdiction interface interface data unit interface message processor interface processor interference interim approval interlock intermediary bank intermediate text block intermittent error intermodulation distortion internal audit internal auditor internal control documentation internal control review internal controls internal reciprocal internal security audit internal security controls internal subject internal use international alphabet number 5 International Association for

Microcircuit Cards International Information Integrity

Institute International Information Systems

Security Certification Consortium International Network Working Group International Packet Switched Service International Standards Organization

International Telecommunications Union

Internet Internet protocol internetworking interoperability interprocess communication interrupt interrupt controlled 110 intersymbol dependence intervention signal intractable intruder intruder detector system intrusion intrusion detection intrusion detector Invader invariant inversion inverted file investigation invitation INWG ionization smoke sensor I/O IP IPC IPL IPSE IPSS IR Iraqi Warrior IRE irreversible encryption isarithmic control ISC2

ISDN ISN ISO ISO-7 ISO 7498 ISO 7810 ISO 7811 ISO 7816 ISO 7982-1 ISO 8372 ISO 8583 ISO 8730 ISO 8731 ISO 8732

ISO 9564 ISO 9735 ISO 9992 ISO 9807 ISO 10126 ISO 10202 ISOA isochronous transmission isolated adaptive routing isolation isolation enforcement ISO OSI ISRD ISSA ISSO issuer IT ITAR ItaVir item Items of Intrinsic Military Utility iteration ITSEC ITSEF ITSEM ITU IV IVP IV&V

jamming Jeff Jerusalem job transfer and manipulation join Jo1o Joker Joshi journal ITM July 13th jump out June 16th Justice

KDC KEEPROM Kennedy Kerberos kernel kernelized

Subject Index 599

key key agreement key certification center key check value key ciphertext avalanche key collision key component key crunching key distribution and control key distribution center key encrypting key key encrypting key pair key equivocation key exhaustion key generation key generator key gun key hashing key identifier keying material keying relationship keyless cryptography key library key list key loader key management key management device key management facility key notarization key offset key pair key partitioning Keypress key register key service message key space keystone equipment key stream key stream generator keystroke dynamics analysis key tape key translation center key transport module key variant key verification code keyword kiss off tone kiting knapsack cipher KNF knowhow

600 Subject Index

knowledge base knowledge engineering known plaintext KNS Korea KSM KSOS Kukaturbo KVC KVM/370

label Label Lamport Diffie signature LAN Landwehr's security model for military

message systems language LAN security LAP laser intrusion detector last in first out lattice lattice model LAVA Law Enforcement Incident Reporting

System Lazy LCD LCG LCM LDDS leaf leakage Leapfrog Virus leased circuit leased line least common mechanism least common multiple least cost network design least privilege least significant bit least significant digit Lehigh LEIRS Leprosy Leprosy-B letter bomb level LFSR Liberty

LIFO light conduit light guide LIMDIS limited access limited ADP access security mode limited distance modem limited protection Lindop Committee line line adaptor unit linear complexity linear congruential generator linear equivalence linear feedback shift register linear function linear query linear recurrence relation line communications line control line driver line impedance line level line load line protocol line sensor line speed line termination equipment line transient link linkage link encryption link protocol link to link encryption liquid crystal display Lisbon list Little Pieces load loading load life load sharing loan utilization local alarm system local area network local echo local fire alarm system local mode local network local noninterfering coded station local software echo

local transaction lock lock-and-key protection system locking lockout lock up lockword loco log logarithm logging logic logical logical access control logical channel logical completeness measure logical database logical data independence logical expression logical operator logical party logical record logical security logical threat logical unit logic bomb logic circuit logic path analysis program log in log off log on log out long haul network longitudinal parity check longitudinal redundancy check long key loop loopback test loop checking loophole loop network loop plant loro account loss low coercivity low level language low speed low water mark LRC LTE Lucifer

MAA MAB MAC

Subject Index 601

machine code instruction machine independence machine language MAC residue macrobend loss magnetically encoded card magnetic disk magnetic field intensity magnetic flux magnetic remanence magnetic saturation magnetic sensor magnetic spot card magnetic stripe card magnetic tape mag stripe card mail box mainframe main memory maintainability maintenance make v buy malfunction malicious code malicious logic malware MAN managed data network manchester encoding mandatory access control mandatory security mandatory security policy manipulation detection man-made noise man month manual alarm initiating device manufacturing automation protocol MAP mapping Mardi Bros Marion mark marking masking masquerade masquerading mass storage device master code card

602 Subject Index

master coded system master file master key master station matching matching network material materiality mathematical model matrix matrix methodology MCC McCulloh-type system MC system MDC MDF MDN mean life mean time between failure mean time to recover mean time to repair medium access control medium speed meet in the middle memo advice memory bounds memory bounds checking memoryless control memory protection mental poker meridional ray Merkle Hellman knapsack cipher Mersenne prime mesh message message authentication message authentication algorithm message authentication block message authentication code message certification message digest message exhaustion message format message heading message identifier message integrity code message numbering message oriented text exchange message routing message sequence number message slot

message space message specific random integer message stream modification message switching message switching center message text message transfer agent metadata method of advice metropolitan area network MF keypad MGTUVirus MIC Michelangelo MICR microbend loss Microbes microcircuit card microcomputer microdata file micro mainframe link microprocessor microprocessor card microwave motion detection microwave sensor MID midnight attack migration military critical technology Milnet Milwauke 414 mimicking minimal cover time minimum knowledge proof minimum weight routing minor change to a system of records MIPS Mirror miscellaneous common carrier MIXl Mix2 MLAT MLS MMS mockingbird MOD mode mode dispersion model modeling MODEM

mode of attack modn modular redundancy modulated photoelectric sensor modulating signal modulation modulation rate modulator module interface analysis modulo arithmetic modulo n modulo N check modulo 2 monitoring monitoring station monoalphabetic cipher monolithic TCD monomode fiber Monxla Morris worm motion detector MOTIS M out of N code MSAR m-sequence MSFR MSM MTA MTBF MTS multicast multidrop circuit multilevel database security multilevel device multilevel network subject multilevel secure multilevel security mode multilink multimode fiber multipath mUltiple access rights terminal mUltiple categories multiple DES encipherment multiple key retrieval mUltiple routing multiplex multiplexer multiplexing mUltiplex mode multipoint circuit multipoint connection

Subject Index 603

multi-user security mode of operation municipal area network Murphy Music Bug mutual authentication Mutual Legal Assistance Treaty mutually prime mutually suspicious mutual security MUX MVS

NAK NAK attack narrow band NASA National Aeronautics and Space Agency National Commission on Data

Processing and Freedoms National Communications Security

Directive 4 National Computer Security Center National Crime Information Center National Institute for Science and

Technology National Security Agency/Central

Security Service National Security Directive-42 native key native mode natural language navigation NCC NCIC NCSC necessary bandwidth need to know need to know violation negative acknowledgement negative card negative disclosure negative file negative safeguard netkey network network architecture network component network connection network control program network control station network control system

604 Subject Index

network database network delay network diagram network discretionary access control network encryption network guard network layer network management network management system network operating center network redundancy network reference monitor network security network security architecture network security model network sponsor network structure network system network termination unit network timing network topology network trusted computing base network user identification network user identity network virtual terminal network weaving new hire orientation New Sunday next day funds nibble NIFTP NUT Nina NIST NKSR NMR no contract node node computer node encryption NOFORN noise noise temperature nomenclature Nomenclature nonbreak glass station nonce noncoded system noncompatibility nondenseindex nondestructive readout

nondeterministic polynomial class non-discretionary security noninvertibility non-kernel security-related software nonoverwriting virus nonprime attribute nonprocedural language nonrepudiation nonreturn to zero nonsecret design nonstandard sector nonswitched line nontransparent mode nonvolatile storage normal forms nostro account notarization NP Class NP complete n-respondent, k%-dominance NRZ NSA NSA COMSEC module NSD-42 NSDD NSDD-145 NSI NTCB NTCB partition NTISS NTISSC NTISSD NTISSP-200 n-tuple nucleus NUl nuisance alarm null modem null string null suppression number number crunching

OA object object authentication object code objective of defense objectivity object language object program

object protection object reuse OCD OCI OCR octal octet odd even check odd parity odd prime ODETTE Oe OEM oersted OFB off line off line card reader off line crypto-operation off line encryption offset off site storage Off Stealth OIS 21 OMB OMR one category one end device one key cryptosystem one time pad one-time passwords one way cipher one way function one way hash function onion skin architecture onion skin language on line on line card reader on line crypto-operation on line encryption Ontario open hot site open position open security environment open shop open storage open system open systems open systems interconnection operand operating system operating time

Subject Index 60S

operational data security operational site security manual operational vulnerability operations security indicators operator OPM OPNAVINST OPSEC optical character recognition optical density card optical digital disk optical disk optical disk storage optical mark recognition optical memory optional Orange Book ORCON order order control ordinal orientation original equipment manufacturer originator originator's bank Oropax OSI OSI security OSN other card data OTP OUSDR&E outage output output feedback output protection outsourcing overhead bit overlap control overlay network overt channel overwrite cycle overwrite procedure overwriting overwriting virus OWF ownership

PI P2 P3

606 Subject Index

PABX pacing packet packet assembler/disassembler packet interleaving packet radio packet sequencing packet switching packet switching exchange packet switching network packet switch node packet terminal packing density PACX PAD padding padding indicator page page frame page mode terminal palindromic key palmprint analysis PAM PAN parallel communication parallel computer parallel messages parallel operation parallel processing parallel simulation parallel transmission parameter parent Paris parity Parity parity bit parity checking passband passive passive attack passive electronic card passive sensor passive threat passive wiretapping passphrase password password based encryption algorithm password dialogue password system patch

path patrol scrutiny pattern directed analysis pattern sensitive fault pause retry pay date Payday payment payment cycle payment message payment order payment service Pbox PC P Class PCM PCS POC POM PON POS POU peer entity peer entity authentication PEM penetration penetration profile penetration signature penetration study penetration testing Pentagon percentage supervision percent denial perfect secrecy performance standard Perfume perimeter perimeter barrier periodic audit periods processing peripheral permanent data call permanent virtual circuit permissions permutation persistent object personal authentication personal computer personal computer security personal computing personal data

personal disclosure personal identification personal identification number personal identifier personal password personal verification personnel security perturbation pervasive security mechanism Phantom phase delay phase modulation phase shift keying phone phreaking photoelectric beam smoke detector photoelectric sensor photosensor phracker phreak physical barrier physical control space physical database physical data independence physical layer physical record physical security physical threat PI PIC piezoelectric detector piggyback piggyback entry piggybacking PIN PIN assignment Ping Pong-B PIN issuance PIN mailer PIN management and security PIN offset PIN pad PIN validation PIN verification PIN verification value pipeline cipher pipeliniog PIR piracy PKC Plague plaintext

Subject Index 607

plaintext ciphertext avalanche planted record Plastique plug compatible manufacturer POB pocket banking Pohlig-Hellman cipher pointer point of sale point-of-sale terminal point protection point to point point-to-point environment Poisson distribution polarized return to zero police connect police station unit policy Polimer Polish-2 Polish 217 polling polling list polling overhead polyalphabetic cipher polyinstantiation polynomial code polynomial time port portability portable detector system portable duress sensor portfolio port protection device POS positive noninterfering and succession

coded station positive response postcondition posting date Post Telegraph and Telephone postulated threat potential vulnerability power power restart PPD PPL PPM pre-alarm precondition predicate

608 Subject Index

predicate transformer Preferred Products List prefix presence detector presentation layer presignal system preventive maintenance primary account information primary account number primary key primary station prime attribute prime number primitive primitive root principal principle of closed environment principle of complete mediation principle of least common mechanism principle of least privilege principles of secure systems printed circuit board Print Screen print suppress priority priority processing priority scheduler privacy Privacy Act 1974 privacy enhanced mail privacy protection privacy transformation private address space private automatic branch exchange private cryptography private dial port private key private key encryption private line privilege privileged data privileged instructions privileged process privilege profile privity procedural language procedural security procedure procedure oriented language procedures process

processing processing priority processor processor utilization product product cipher production run product type profile profiles program program analyzer program comparison utilities program language programming programming standards program patch program specification program statement projection proof of program correctness PROPIN proprietary data proprietary fire alarm system protected distribution system protected subsystem protected wireline distribution system protection protection-critical portions of the TCB protection pattern protection philosophy protection ring protective redundancy protocol protocol converter protocol data unit protocol standards protocol suite provisions proximity card reader pseudo-flaw pseudorandom number PSK PSN PSOS PIT public data network public dial port public domain public key public key cryptography

public key distribution public switched network pull station pulse amplitude modulation pulse code modulation pulse duration modulation pulse modulation pulse position modulation pulse repetition rate pulse train pulse width modulation purging PVC PVV

QAM quadratic residue quadrature amplitude modulation qualitative risk analysis quantitative risk analysis quantize quantizing noise query language query modification query set query set size control queue queuing time

Rabin signature RACF radar sensor radio frequency emissions radio frequency interference radio frequency motion detector radix Rainbow Series RAM RAMP random random access random access memory random cipher random data perturbation random line switching random numbers random process random rounding random sample queries range rank

Subject Index 609

rate rating maintenance program rational number raw data RBAC RO ROC read read access read only memory ready state real number realtime realtime input realtime operation realtime output realtime reaction reasonableness check received data received line signal detector receive only receiver receiver's correspondent bank receiver signal element timing receiving bank recipient reciprocal reconciliation record record based perturbation record layout record length record lock record separator character recovery recovery procedures recursion analysis recursion length recursive routine recursive subroutine red redlblack concept Red Book red tape operation reduced set of residues redundancy redundancy checking redundant code redundant processing RedX re-encipher from master key

610 Subject Index

re-encipher to master key reference reference monitor reference monitor concept reference PIN reference validation mechanism regeneration register register insertion regrade regulatory agency reimbursement bank reimbursement party re-key REL relation relational algebra relational calculus relational database relational operator relationship relative error relatively prime relative table size control relay relay center release time and date reliability reliability of service remanence remitter remote remote access remote batch processing remote detector panel remote diagnostic center remote job entry remotely accessed resource-sharing computer system remote station remote station fire alarm system remote station system removable cartridge disk repeatability repeater repeating group reperformance test replay replenishment deposit reporting line reproducibility

repudiation request for service message request reply service request response request service initiation request to send requirement rescue dump Research in Secured Operating Systems reset resident software residual error rate residual intelligibility residual risk residue residues problems resource resource sharing resource sharing computer system responder response service message response time response to request service message restricted area result based perturbation retailer retention period retro target reusability reverse engineering reverse funds transfer reverse interrupt reversible encryption review and approval RF RFE RFI rfm rfink RFS ring ring back ring indicator risk risk analysis risk analysis methodologies risk assessment RISKCALC risk index risk management RISOS

RJE rogue fiber rollback roll call polling rolling up ROM ROS rotation rotation of duties router routing routing control routing table RS RS-232C RS-232 RS-366 RS-422A RS-423A RS-449 RSA RSI RSM RTM rtmk RTR rule rule based access control rule based security policy rule based system running key run to run totals RIW

S-847 sabotage Saddam safeguard safeguarding statement safe prime safety SAGITIAIRE SAISS salami technique same day funds sampling sandwich tape sanitization sanitizing saturation testing Saturday 14th

S box scalar scalar product scan scanner scanning scavenging scenario analysis scheduled circuits schema schematic Schnorr cipher SCI

Subject Index 611

scientific and technical information SCOMP Scott's Valley scrambler scrolling scroll mode terminal scrubbing SDLC SOU search key SECDED secondary channel secondary destination secondary key secondary station second normal form second sourcing secrecy secrecy classification secrecy order secrecy policy Secret secret clearance secret key secret key algorithm secret key encryption secret sharing scheme sector secure channel secure configuration management secure management information base secure module secure operating system secure path secure state secure telephone system secure working area

6U Subject Index

security security architecture security area security audit security audit trail security breach security compliant channel security critical mechanisms security feasibility study security filter security flow analysis security function security incident security inspection security kernel security label security level security life security line security log security loop security management security measures security mechanism security model security modem security module security monitor security objective security parameter security perimeter security peripheral security policy security policy model security relevant event security requirements security safeguards security service security specifications security target security test and evaluation security testing security threats security violation seed seepage segment seismic sensor seize selection selective calling

selective coded system selective dump selective field protection selective repeat selector channel self banking self checking circuit self correcting code self synchronizing self synchronous semantics semiweak key sender sender's correspondent bank sending bank sensitive application sensitive business data sensitive compartmented information sensitive data sensitive defense information sensitive information sensitive software sensitive statistic sensitive systems sensitivity sensitivity and criticality sensitivity assessment sensitivity label Sentinel separate and mediate separation of duties or functions separation of privilege sequential card reader sequential switcher serial communication serial computer serial interface serial transmission server service bureau service data unit service machine service message service provider service type service user session session key session layer session security level set

settlement shadow Shake shannon Shannon's five criteria Shannon's Law shareware sharp eyed cashier shell site shielded cable shielding effectiveness shift shift codes shift factor shift register shouldering shoulder surfing shrink wrapped license SIC Sieve of Eratosthenes signal signal element signalling signal quality detector signal to noise ratio signature signature analysis signature construction signature deconstruction signature service significant modification sign in sign on simple mail transfer protocol simple security property simplex simplicity simulation simultaneous transmission single address message single-level device single point of failure single stroke bell single supervised system single voiding card reader sink sink tree SIOP-ESI SIT A high level network site polling Skism

Subject Index 613

slave slice network sliding window protocol sliding window system slotted ring slow smart card smart terminal SMF SMIB smoke detector SMTP SNA snapshot Snefru sIn ratio societal vulnerability soft error softlifting software software analysis software creep software development-life cycle software engineering software house software interface functions software interrupt software license software maintenance software package software piracy software protection software quality software redundancy software security software security certification software tool SOIC Solano SOM something the user bas something the user is something the user knows SON sonic motion detector sonogram sonograph Sorry source source authorization source code analyzer

614 Subject Index

source code source code escrow source language source program source suppression SOW space space division multiplexing space division switching space protection spacial redundancy span sensor Special special access programs specialized common carrier special markings special purpose specification speech invertor speech recognizer speech scrambling speech synthesizer SPEED split knowledge split site spoofing spoofing program spray paint spurious association initiation spurious key decipherment SPX Spyer SRN SSN SSO stack stack pointer Staf stale message standalone terminal standards standby standby equipment standby facility star Star Dot star property star security property start bit start element start of header

start of text start stop envelope state statement static analysis static data static dump static evaluation station statistical database statistically unique statistical time division multiplexing statmux status poll STDM stealth virus ST&E steganography ST &E tools and equipment STI Stone-90 Stoned stop and wait protocol stop bit stop element storage object storage protection store and forward stream cipher stream cipher chaining strength Striker string stripe reader stripping strong intersymbol dependence structural redundancy structure analysis STU-III stub STX subject subject security level sub-key Subliminal subroutine subschema subscriber's unit subset substantive testing substitute character

substitution box substitution cipher summary processing summation check Sunday supercomputer superencipherment superimposed circuit superincreasing series superposed circuit supersmart card superuser supervised line supervised system supervision supervisor state supervisory sequence supervisory signal superzapping SURIVOI SURIV02 susceptibility suspense account suspense file SVC Sverdlov Swap Boot sweeping SWIFT Swiss 143 switched network backup switched network switched virtual call switching switching center switching office SylviaIHolland symmetric algorithm symmetric cipher symmetric cryptosystem symmetric key system SYN sync sync bit synchronization pulses synchronous synchronous data link control synchronous data network synchronous idle character synchronous modem synchronous stream cipher

Subject Index 615

synchronous transmission sync pulses syntax Syslock SYSOP system systematic ranges systematic rounding system authentication system card reader system code system high system high security mode system integrity system integrity procedures system low system manager system network architecture system penetration system saboteur systems analysis system security audit System Security Officer system users

table table restriction TAC tagged keys tail tailgating Taiwan Taiwan3 Taiwan4 take-grant access control tamperproof tamper resistant module tape tape dialer tape streamer target of evaluation tariff task TBDF Tcarrier TC 11 TC 68/SC2 TC 97/SC17IWG4 TC 97/SC20 TCB TCB Subset

616 Subject Index

TCP TCP/IP TCSEC TDF TOM tear-me-open technical and office protocol technical data technical policy technical security technical vulnerability technological attack technology telebanking telecommunications telecommunications and automated

information systems security teleconferencing teleinformatic services telemetering telemetry telemonitoring telephone dialer telephone intrusion telephone scrambler telephone tap teleprocessing teleprocessing security teletext teletext decoder TELNET Telpak Tempest Tempest control zone Tempest proofing template temporal separation tera term terminal terminal access controller terminal authentication device terminal handler terminal identification terminal key terminal thief Terror test test amount test data Tester

test key text text compression theoretically secure third normal form third party transfer threaded tree threat threat agent threat analysis threat monitoring threat team three layer architecture threshold throughput ticket tie line tie trunk tiger team time and space requirements time bomb time date stamp time-dependent password time derived channel time division multiple access time division mUltiplexing time division switching time element scrambler time limit cutout time out time redundancy time sharing time slice time stamp Tiny Tiny-i33 TLS TMR T network TNF TNI TOCTIOU problems TOE token token authenticator token bus token management token ring TOP top down method top-level specification

topology Top Secret top secret clearance TP Traceback trace packet tracker tractable trade cycle traffic traffic analysis traffic flow confidentiality traffic flow security traffic padding trailer tranquility transaction transaction code transaction driven system transaction key transaction key set transaction key system transaction number TransactionlPayment Message transaction processing transaction set transaction trail transborder data flow transborder restrictions transceiver transfer transformational coding transformation procedure transitive dependence translation cipher translator transmission transmission control protocol transmission window transmitted data transmitter transmitter signal element timing transparent transparent data communication code transponder transport layer transposition cipher trapdoor trapdoor one way function Treaty of Schengen tree

tree database tree structure Trellis coding tribit tributary station trigram

Subject Index 617

triple modular redundancy TRM Trojan Horse Trojan Horse direct release Trojan Horse leakage trouble condition troubleshoot trouble signal trunk trust trusted trusted channel trusted communications path trusted computer security evaluation

criteria trusted computer system trusted computing base trusted functionality trusted identification forwarding trusted path trusted process trusted products trusted software trusted subject trusted system trustworthiness TSW TTAP tuned circuit card Tunes tuning tunneling attack tuple turnkey system twisted pair two dimensional scrambler two end device two key cryptosystem two layer architecture two wire circuit TX Tymnet type Type I type accreditation

618 Subject Index

Type I cryptographic product Type 2 cryptographic product Type 2 error Type I magnetic media Type 2 magnetic media Typo Boot Typo/Fumble

UA UCCI UDAC UDI UL ultimate beneficiary ultrasonic motion detector ultraviolet fire detector unapproved software unary operation unauthorized disclosure unbalanced transmission unbreakable cipher Unclassified unclassified information uncleared unconditionally secure unconfirmed service unconstrained data item undecidable Underwriter's Laboratory unicity distance unipolar unique identification unit buffer terminal universal quantifier universal set universal signature Unix unprotect untrusted untrusted process update inconsistency upload uptime upward compatibility usability usage usage sensitive pricing USASCII USASI user user acceptability

user agent user alternative plan user authentication user-directed access control user friendly user id user profile user programs users group USSR UU

V V.l V.2 V.3 V.4 V.5 V.6 V.IO V.ll V.13 V.15 V.16 V.19 V.20 V.21 V.22 V.22 bis V.23 V.24 V.25 V.26 V.26 bis V.27 V.27 bis V.27 ter V.28 V.29 V.30 V.3l V.32 V.35 V.36 V.37 V.40 V.4l V.50 V.5l V.52 V.53

V.54 V.55 V.56 V-299 V-555 V800 V-801 V-96 I V2000 V2100 vaccine Vacsina VAD validation validity checking valid password value added network service value added service provider value date value of service pricing vandalware van Eck phenomenon VANS V ANS security VAR variable variable length record varying density holographic card VASP Vbb Vcomm VDU vector veincheck verification verify Vemam cipher version number vertical redundancy check vibrating bell vibrating hom vibration detector Victor video motion detector video switcher videotex videotext Vienna/648 view viewdata violation of transmission security

Violator virtual virtual call service virtual circuit virtual machine virtual memory virtual password virtual terminal

Subject Index 619

virtual terminal protocol virus Virus-90 Virus-101 virus names visual display unit vocoder voice analysis voice answer back voice band voice bank voice grade channel voice mail voice print voice scrambling voice store and forward volatile storage volume volumetric sensor von Neumann Voronezh vostro account V -Series recommendations of CCnT VTP vulnerability vulnerability assessment

W-13 WACK WADS WAN warm site warm standby watermark tape wavelength division mUltiplexing WDM weak bits weak key Whale what if White Book white card fraud white noise

620 Subject Index

wide area data service wide area network wideband channel Wiegand effect window windows wipe through card reader wire center wired logic card wire service wiretap wiretapping Wisconsin WNINTEL Wolfman word word-frame counter word length work factor workstation worm WORM worst case condition write write access

X X.I X.2 X.3 X.4 X.20 X.20 bis X.21 X.22 X.24 X.25 X.26 X.27 X.28 X.29 X.30 X.31 X.32 X.33 X.40 X.50

X.50 bis X.51 X.52 X.53 X.54 X.60 X.61 X.70 X.71 X.75 X.80 X.87 X.92 X.93 X.95 X.96 X.110 X.12I X.130 X.132 X.150 X.180 X.2OO X.210 X.4OO X.435 XAI Xmas tree X-modem XON-XOFF protocol XOR X -Series recommendations of CCITI

Yankee Doodle Yankee-2 Yellow Book Younger Committee

Zero Bug zero effort rate ZeroHunt zeroization zero knowledge proof zero order correlation immune zoning ZSI