Skip to main content

Trust in Cyberspace (1999) / Chapter Skim
Currently Skimming:

Index
Pages 319-331

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 319...
... , 56, 300 Advanced Automation Systems air-traffic control system, 99 Advanced Research Projects Agency network (ARPANET) , 29-30, 34, 133, 283, 301 switching node for, 307 Alcatel, 220 American National Standards Institute (ANSI)
From page 320...
... See Constructive cost model Collective behavior, research into, 299 COM. See Common object model Commercially licensed evaluation facilities (CLEFS)
From page 321...
... , 44, 303 CORBA. See Common object request broker architecture Correctness, 14, 75, 92-93, 97, 303 Cost pressures, 3, 13, 38 Costs consumer, 181-184, 252 direct, 181-182 estimating, 67 indirect, 182 producer, 192-194 See also Failure costs COTS components.
From page 322...
... , 100, 304 CTCPEC. See Canadian Trusted Computer Product Evaluation Criteria CUGs (closed user groups)
From page 323...
... , 184185, 218 Foreign code, 7, 111, 139-149, 249-250 323 Foreign espionage agent threat, 286 Formal methods, 7, 95-101, 103-104, 246, 306 Formal policy models, shortcomings of, 115-117, 120-121 Fortezza technology, 138, 226-227, 306 Frame relay, 132 Freeh, FBI Director Louis, 18 FTP (File Transfer Protocol) , 294, 306 proxy, 294 G Gateway routing protocols, 30, 135, 212 General Accounting Office (GAO)
From page 324...
... , 35, 307 Interfaces, 2 to facilitate intervention and control, 17 server, 284 International Computer Security Association, 197 International Organization for Standardization (ISO) , 31 Internet, 5, 21, 163-164 attacks on, 50-55 business use of, 58 downloading software from, 140 managing congestion on, 3940 operational error on, 4243 protecting, 242-243 readiness for business, 56-57 security of, 36-37 telephony, 55-56 vulnerability of, 56-58
From page 325...
... See Information Warfare Defense J Java, 85, 142, 283, 308 JavaBeans, 87, 308 Joint-service programmable radio, 97 Joint Technology Office. See Information Systems Security Researchloint Technology Office JVM Java virtual machine)
From page 326...
... , 226, 310 National Cryptologic Strategy for the 21st Century, 225 National Information Assurance Partnership, 208, 220 National Information Infrastructure initiative, 216 National Infrastructure Protection Center, 217 National Institute of Standards and Technology (NIST) , 199, 203, 218, 220, 223, 306, 310 National Partnership for Reinventing Government (NPRG)
From page 327...
... See Private line interface Postdeployment upgrades, 104, 296 PostScript, 140 Precursor information, protecting, 297 Presidential Decision Directive (PDD) 63, 13, 20, 216, 240 President's Commission on Critical Infrastructure Protection (PCCIP)
From page 328...
... See SAP Radio, programmable, 97 Radio Technical Commission for Aeronautics. See RTCA Rapid recovery, research into, 299 Reconfiguration, 159-160 Reconstitution, research into, 299 Red Book, 162, 313 Redundancy, 41 research into, 298 See also Reserve capacity Reliability, 14, 313 amplifying, 155-157 Replication, 154-158, 250 of components, 14 Report of the Defense Science Board Task Force on Information Warfare Defense, 286 Requests for proposals (RFPs)
From page 329...
... See Standard template library Storage, procedural controls on, 297 Structured walkthrough, 84 STU. See Secure Telephone Unit Stubs, 93 Subsystems, 116-117 Survivability.
From page 330...
... , 133, 316 Token-based mechanisms. See Hardware tokens Top-down integration, 93 Top Secret enclaves, 292, 315 Trade-offs, managing, 176, 194 Traffic profile, 41 Transparency, 294 Transport layer, 293-294 procedural controls on, 297 terminating instantiations of, 294 Trojan horse attacks, 18, 115, 316 Trust, 11 erosion of, 15-20 warranted, 255 Trusted Computer System Evaluation Criteria (TCSEC)
From page 331...
... , 201, 317 331 Windows NT, 157-158, 229, 283, 291, 317 Work factor model, 178, 185, 317 World Wide Web (WWW) downloading software from, 140 exploding popularity of, 62 X X.25 protocol suite, 35,132-133, 317 XEU (Xerox encryption unit)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.