Index
[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[Y]
[Z]
CAIDA (Cooperative Association for Internet Data Analysis) 2nd 3rd 4th 5th CanSecWest CERT/CC (CERT Coordination Center) advisories CA-1999–17 "Denial-of-service tools," CA-2000–01 "Denial-of-service developments," established first (DSIT) workshop 2nd 3rd 4th 5th incident notes IN-99–04 "Attacks using various RPC services," reporting to Web site Chain of custody Challenges [See also puzzles.] Characterization of attacks Charges for packet sending Chats.
[See IRC (Internet Relay Chat).] CIDR (classless internet domain routing), definition Circuit-switched networking Civil law 2nd [See also legal issues.] Class actions suits [See also legal issues.] Classless internet domain routing (CIDR), definition Client legitimacy.
[See service differentiation.] Closed port backdoor Closing unneeded ports CMA (Computer Misuse Act) (United Kingdom) CND-RA (Computer Network Defense-Response Actions).
[See Active Response Continuum.] Code Red worm 2nd 3rd 4th 5th 6th 7th Collateral damage attack response definition filtering legitimate traffic Combining attacks 2nd Combining exploits 2nd Command and control flow Compartmentalizing your network Competitor attacks Completeness, defense strategy Computer Communication Review Computer data, as property Computer Fraud and Abuse Act (18 U.S.C.§1030) Computer Network Defense-Response Actions (CND-RA).
[See Active Response Continuum.] Conferences and workshops. [See also online resources, publications.] ACM SIGCOMM Annual Computer Security Applications Conference Black Hat Briefings CanSecWest ICNP (International Conferences onNetwork Protocols) IEEE Information Assurance Workshop IEEE International Conferences on Network Protocols IEEE Symposium on Security and Privacy Infocom NDSS (Networks and Distributed Security Symposium) NSPW (New Security Paradigms Workshop) Usenix Security Symposium Usenix Technical Conference Congestion avoidance Congestion control mechanisms Congestion signatures Connection depletion attacks, defense approaches Controlling agents attack phase direct commands indirect commands unwitting agents Convention on Cybercrime Cooperative Association for Internet Data Analysis (CAIDA) 2nd 3rd 4th 5th COordinated Suppression of Simultaneous AttaCKs (COSSACK) Coordinating defenses Core-based techniques COSSACK (COordinated Suppression of Simultaneous AttaCKs) Cost of attacks. [See also damages.] aggregating cost-estimation model defense "Developing an Effective Incident Cost Analysis Mechanism," estimating 2nd examples FBI report (2004) gambling business hidden costs ICAMP (Incident Cost Analysis and Modeling Project) IRC (Internet Relay Chat) loss, legal definition 2nd overprovisioning trigger for federal statutes United States v. Middleton unused spare equipment Cost-estimation model Courts.
[See legal issues.] Covert channels Crackers.
[See attackers, hackers.] Criminal attacks [See also legal issues.] Criminal culpability [See also legal issues.] Criminal law 2nd [See also legal issues.] Critical versus non-critical services cron Cryptogram list Cryptogram newsletter CSI/FBI Computer Crime and Security Survey Custom attack tools Custom defense systems Cyber law.
[See legal issues.] Cybercrime [See also legal issues.] Cyberwarfare
|