home *** CD-ROM | disk | FTP | other *** search
/ Federal Information Systems Security Awareness 2.0 / Federal_Information_Systems_Security_Awareness_Version_2.0_February_2002.iso / content / links.txt < prev    next >
Text File  |  2001-08-15  |  16KB  |  1 lines

  1. link1=Access&link2=Access Control&link3=Access Control List (ACL)&link4=Access Control Mechanism&link5=Access Control Officer (ACO)&link6=Access Level&link7=Access List&link8=Access Period&link9=Access Profile&link10=Access Type&link11=Accessible Space&link12=Accountability&link13=Accounting Legend Code (ALC)&link14=Accounting Number&link15=Accreditation&link16=Accreditation Package&link17=Add-on-Security&link18=Address Spoofing&link19=Adversary&link20=Advisory&link21=Alert&link22=Alternate COMSEC Custodian&link23=Anti-jam&link24=Anti-spoof&link25=Assembly&link26=ASSIST&link27=Assurance&link28=Attack&link29=Attention Character&link30=Audit&link31=Audit Trail&link32=Authenticate&link33=Authentication System&link34=Authenticator&link35=Authorized Vendor&link36=Authorized Vendor Program&link37=Auto-Manual-System&link38=Automated Information Systems Security&link39=Automated Remote Rekeying&link40=Automated Security Monitoring&link41=Back Door&link42=Backup&link43=Banner&link44=Bell-La Padula Security Model&link45=Benign&link46=Benign Environment&link47=Beyond A1&link48=Binding&link49=Biometrics&link50=Bit Error Rate&link51=BLACK&link52=Boundary&link53=Brevity List&link54=Browsing&link55=Bulk Encryption&link56=Call Back&link57=Call Sign Cipher&link58=Canister&link59=Capability&link60=Cascading&link61=Category&link62=CCI Assembly&link63=CCI Component&link64=CCI Equipment&link65=Central Office of Record (COR)&link66=Certificate&link67=Certificate Management&link68=Certificate of Action Statement&link69=Certificate Revocation List&link70=Certification&link71=Certification Agent&link72=Certification Authority Workstation&link73=Certification Package&link74=Certification Test and Evaluation (CT&E)&link75=Certified TEMPEST Technical Authority (CTTA)&link76=Challenge and Reply Authentication&link77=Check Word&link78=Checksum&link79=Cipher&link80=Cipher Text&link81=Cipher Text Auto-Key&link82=Ciphony&link83=Clearing&link84=Closed Security Environment&link85=Code&link86=Code Book&link87=Code Group&link88=Code Vocabulary&link89=Cold Start&link90=Command Authority&link91=Commercial COMSEC Endorsement Program (CCEP)&link92=Common Fill Device&link93=Communications Cover&link94=Communications Deception&link95=Communications Profile&link96=Communications Security (COMSEC)&link97=Compartmentalization&link98=Compartmented Mode&link99=Computer Cryptography&link100=Computer Security&link101=Computer Security Incident&link102=Computer Security Subsystem&link103=COMSEC Account&link104=COMSEC Account Audit&link105=COMSEC Aid&link106=COMSEC Boundary&link107=COMSEC Chip Set&link108=COMSEC Control Program&link109=COMSEC Custodian&link110=COMSEC End-Item&link111=COMSEC Equipment&link112=COMSEC Facility&link113=COMSEC Incident&link114=COMSEC Insecurity&link115=COMSEC Manager&link116=COMSEC Material&link117=COMSEC Material Control System (CMCS)&link118=COMSEC Modification&link119=COMSEC Module&link120=COMSEC Monitoring&link121=COMSEC Profile&link122=COMSEC Survey&link123=COMSEC System Data&link124=COMSEC Training&link125=Concept of Operations (CONOP)&link126=Confidentiality&link127=Configuration Control&link128=Configuration Management&link129=Confinement Channel&link130=Confinement Property&link131=Contamination&link132=Contingency Key&link133=Contingency Plan&link134=Controlled Access Protection&link135=Controlled Cryptographic Item (CCI)&link136=Controlled Security Mode&link137=Controlled Sharing&link138=Controlled Space&link139=Controlling Authority&link140=Cooperative Key Generation&link141=Cooperative Remote Rekeying&link142=Correctness Proof&link143=Cost-Benefit-Analysis&link144=Countermeasure&link145=Covert Channel&link146=Covert Channel Analysis&link147=Covert Storage Channel&link148=Covert Timing Channel&link149=Credentials&link150=Critical  Infrastructures&link151=Cryptanalysis&link152=CRYPTO&link153=Crypto-Alarm&link154=Crypto-Algorithm&link155=Crypto-Ancillary Equipment&link156=Crypto-Equipment&link157=Cryptographic&link158=Cryptographic Component&link159=Cryptographic Equipment Room&link160=Cryptographic Initialization&link161=Cryptographic Logic&link162=Cryptographic Randomization&link163=Cryptography&link164=Crypto-Ignition Key (CIK)&link165=Cryptology&link166=Cryptonet&link167=Cryptoperiod&link168=Cryptosynchronization&link169=Cryptosystem&link170=Cryptosystem Assessment&link171=Cryptosystem Evaluation&link172=Cryptosystem Review&link173=Cryptosystem Survey&link174=Cyclic Redundancy Check&link175=Dangling Threat&link176=Dangling Vulnerability&link177=Data Encryption Standard (DES)&link178=Data Flow Control&link179=Data Origin Authentication&link180=Data Security&link181=Data Transfer Device (DTD)&link182=Decertification&link183=Decipher&link184=Decode&link185=Decrypt&link186=Dedicated Mode&link187=Default Classification&link188=Degaussing&link189=Delegated Development Program&link190=Denial of Service&link191=Depot Maintenance&link192=Descriptive Top-Level Specification&link193=Design Controlled Spare Part&link194=Design Documentation&link195=Designated Approving Authority&link196=Dial Back&link197=Digital Signature&link198=Digital Signature Algorithm&link199=Direct Shipment&link200=Discretionary Access Control (DAC)&link201=Distinguished Name&link202=DOD Trusted Computer System Evaluation Criteria&link203=Domain&link204=Dominate&link205=Drop Accountability&link206=Electronic Generated Key&link207=Electronic Key Management System (EKMS)&link208=Electronic Messaging Services&link209=Electronic Security&link210=Electronic Signature&link211=Element&link212=Embedded Computer&link213=Embedded Cryptographic System&link214=Embedded Cryptography&link215=Emissions Security&link216=Encipher&link217=Encode&link218=Encrypt&link219=Encryption Algorithm&link220=End-Item Accounting&link221=Endorsed for Unclassified Cryptographic Item&link222=Endorsement&link223=End-to-End Encryption&link224=End-to-End Security&link225=Entrapment&link226=Environment&link227=Erasure&link228=Evaluated Products List (EPL)&link229=Event&link230=Executive State&link231=Exercise Key&link232=Exploitable Channel&link233=Extraction Resistance&link234=Fail Safe&link235=Fail Soft&link236=Failure Access&link237=Failure Control&link238=Fetch Protection&link239=File Protection&link240=File Security&link241=Fill Device&link242=FIREFLY&link243=Firewall&link244=Firmware&link245=Fixed COMSEC Facility&link246=Flaw&link247=Flaw Hypothesis Methodology&link248=Flooding&link249=Formal Access Approval&link250=Formal Development Methodology&link251=Formal Proof&link252=Formal Security Policy Model&link253=Formal Top-Level Specifiction&link254=Formal Verification&link255=Frequency Hopping&link256=Front-End Security Filter&link257=Full Maintenance&link258=Functional Proponent&link259=Functional Testing&link260=Gateway&link261=Granularity&link262=Gypsy Verification Environment&link263=Hacker&link264=Handshaking Procedures&link265=Hard Copy Key&link266=Hardwired Key&link267=Hash Total&link268=Hashing&link269=Hashword&link270=High Risk Environment&link271=High Threat Environment&link272=Identification&link273=Identity Token&link274=Identity Validation&link275=Imitative Communications Deception&link276=Impersonating&link277=Implant&link278=Ina Jo&link279=Inadvertent Disclosure&link280=Incident&link281=Incomplete Parameter Checking&link282=Indicator&link283=Individual Accountability&link284=Information Assurance (IA)&link285=Information Assurance Red Team&link286=Information Assurance Red Team&link287=Information Environment&link288=Information Flow Control&link289=Information Operations&link290=Information System&link291=Information Systems Security (INFOSEC and/or ISS)&link292=Information Systems Security Equipment Modification&link293=Information Systems Security Product&link294=Initialize&link295=Inspectable Space&link296=Integrity&link297=Integrity Check Value&link298=Interface&link299=Interface Control Document&link300=Interim Approval&link301=Internal Security Controls&link302=Internet Protocol (IP)&link303=Internetwork Private Line Interface&link304=Key Card&link305=Key Distribution Center (KDC)&link306=Key List&link307=Key Management&link308=Key Material&link309=Key Pair&link310=Key Production Key&link311=Key Stream&link312=Key Tag&link313=Key Tape&link314=Key Updating&link315=Key-Auto-Key&link316=Key-Encryption-Key (KEK)&link317=Keying Material&link318=Label&link319=Labeled Security Protections&link320=Laboratory Attack&link321=Least Privilege&link322=Level of Protection&link323=Limited Maintenance&link324=Line Conditioning&link325=Line Conduction&link326=Link Encryption&link327=List-Oriented&link328=Local Authority&link329=Local Management Device/Key Processor (LMD/KP)&link330=Lock and Key Protection System&link331=Logic Bomb&link332=Logical Completeness Measure&link333=Long Title&link334=Low Probability of Detection&link335=Low Probability of Intercept&link336=Magnetic Remanence&link337=Mailicious Code&link338=Maintenance Hook&link339=Maintenance Key&link340=Malicious Applets&link341=Malicious Logic&link342=Mandatory Access Control (MAC)&link343=Mandatory Modification&link344=Manipulative Communications Deception&link345=Manual Cryptosystem&link346=Manual Remote Rekeying&link347=Master Crypto-Ignition key&link348=Material Symbol&link349=Memory Scavenging&link350=Message Authentication Code&link351=Message Externals&link352=Message Indicator&link353=Mimicking&link354=Mode of Operation&link355=Multilevel Device&link356=Multilevel Mode&link357=Mutual Suspicion&link358=National Security Information&link359=National Security Systems&link360=Need-to-know&link361=Network&link362=Network Front-End&link363=Network Reference Monitor&link364=Network Security&link365=Network Security Architecture&link366=Network Sponsor&link367=Network System&link368=Network Trusted Computing Base (NTCB)&link369=Network Trusted Computing Base (NTCB) Partition&link370=Network Weaving&link371=No-Lone Zone&link372=Noncooperative Remote Rekeying&link373=Nonrepudiation&link374=Nonsecret Encryption&link375=Null&link376=Object Reuse&link377=Off-Line Cryptosystem&link378=One-Part Code&link379=One-Time Cryptosystem&link380=One-Time Pad&link381=One-Time Tape&link382=On-Line Cryptosystem&link383=Open Security Environment&link384=Operational Data Security&link385=Operational Key&link386=Operational Waiver&link387=Operations Code&link388=Operations Security&link389=Optional Modification&link390=Orange Book&link391=Organizational Maintenance&link392=Organizational Registration Authority (ORA)&link393=Overt Channel&link394=Over-The-Air Key Distribution&link395=Over-The-Air Key Transfer&link396=Over-The-Air Rekeying (OTAR)&link397=Overwrite Procedure&link398=Packet Filter&link399=Parity&link400=Partitioned Security Mode&link401=Passphrase&link402=Penetration Testing&link403=Per-Call Key&link404=Periods Processing&link405=Permuter&link406=Plain Text&link407=Policy Approving Authority (PAA)&link408=Policy Creation Authority (PCA)&link409=Positive Control Material&link410=Preproduction Model&link411=Print Suppression&link412=Privacy System&link413=Private Key&link414=Privileged Access&link415=Probe&link416=Production Model&link417=Proprietary Information&link418=Protected Communications&link419=Protected Distribution Systems (PDS)&link420=Protection Philosophy&link421=Protection Ring&link422=Protective Packaging&link423=Protective Technologies&link424=Protocol&link425=Proxy&link426=Public Cryptography&link427=Public Key Certificate&link428=Public Key Cryptography (PKC)&link429=Public Key Infrastructure (PKI)&link430=Purging&link431=QUADRANT&link432=Rainbow Series&link433=Randomizer&link434=Read&link435=Read Access&link436=Real Time Reaction&link437=Recovery Procedures&link438=RED&link439=RED Signal&link440=RED/BLACK Concept&link441=Reference Monitor&link442=Reference Validation Mechanism&link443=Release Prefix&link444=Remanence&link445=Remote Rekeying&link446=Repair Action&link447=Reserve Keying Material&link448=Residual Risk&link449=Residue&link450=Resource Encapsulation&link451=Risk Assessment&link452=Risk Index&link453=Risk Management&link454=Safeguarding Statement&link455=Sample Key&link456=Sanitize&link457=SARK&link458=Scavenging&link459=Scratch Pad Store (SPS)&link460=Secure Hash Standard&link461=Secure Operating System&link462=Secure State&link463=Secure Subsystem&link464=Security Fault Analysis&link465=Security Features Users Guide (SFUG)&link466=Security Filter&link467=Security Flaw&link468=Security Inspection&link469=Security Kernel&link470=Security Label&link471=Security Net Control Station&link472=Security Perimeter&link473=Security Range&link474=Security Requirements&link475=Security Requirements Baseline&link476=Security Safeguard&link477=Security Specification&link478=Security Test & Evaluation&link479=Security Testing&link480=Seed Key&link481=Self-Authentication&link482=Sensitive Information&link483=Sensitivity Label&link484=Shielded Enclosure&link485=Short Title&link486=Signals Security&link487=Simple Security Property&link488=Single Point Keying&link489=Single-Level Device&link490=Software System Test and Evaluation Process&link491=Special Mission Modification&link492=Speech Privacy&link493=Split Knowledge&link494=Spoofing&link495=Spread Spectrum&link496=Star (*) Property&link497=Start-Up KEK&link498=State Variable&link499=Storage Object&link500=Subassembly&link501=Subject&link502=Subject Security Level&link503=Sub-Registration Authority (SRA)&link504=Superencryption&link505=Supersession&link506=Superuser&link507=Supervisor State&link508=Suppression Measure&link509=Surrogate Access&link510=Syllabary&link511=Synchronous Crypto-Operation&link512=System Administrator (SA)&link513=System Assets&link514=System Development Methodologies&link515=System High&link516=System High Mode&link517=System Indicator&link518=System Integrity&link519=System Low&link520=System Profile&link521=System Security Engineering&link522=System Security Evaluation&link523=System Security Management Plan&link524=System Security Officer&link525=System Security Plan&link526=Tampering&link527=Telecommunications & Automated Information Systems Security&link528=TEMPEST&link529=TEMPEST Test&link530=TEMPEST Zone&link531=Test Key&link532=Threat&link533=Threat Analysis&link534=Threat Assessment&link535=Threat Monitoring&link536=Ticket-Oriented&link537=Time-Compliance Date&link538=Time-Dependent Password&link539=Traditional COMSEC Program&link540=Traffic Analysis&link541=Traffic Encryption Key&link542=Traffic Padding&link543=Traffic-Flow Security&link544=Training Key&link545=Tranquility&link546=Transmission Security Key&link547=Trap-door&link548=Trusted Computer System&link549=Trusted Computing Base (TCB)&link550=Trusted Distribution&link551=Trusted Facility Management&link552=Trusted Facility Manual&link553=Trusted Identification Fowarding&link554=Trusted Path&link555=Trusted Process&link556=Trusted Recovery&link557=Trusted Software&link558=TSEC Nomenclature&link559=Tunneling&link560=Two-Part Code&link561=Two-Person Control&link562=Two-Person Integrity (TPI)&link563=Type 1 Product&link564=Type 2 Product&link565=Type 3 Algorithm&link566=Type 4 Algorithm&link567=U.S. Person&link568=U.S.-Controlled Facility&link569=U.S.-Controlled Space&link570=Untrusted Process&link571=Updating&link572=User&link573=User ID&link574=User Partnership Program&link575=User Profile&link576=User Representative&link577=Validation&link578=Variant&link579=Verified Design&link580=Virtual Password&link581=Virtual Private Network (VPN)&link582=Vulnerability&link583=Vulnerability Assessment&link584=Work Factor&link585=Write&link586=Write Access&link587=Zero Fill&link588=Zeroize&link589=Zone of Control&link590=linksLoaded=yes