Index
[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[Y]
[Z]
Lagging attacks Law enforcement.
[See legal issues.] Laws.
[See legal issues.] Legal attache (LEGAT) Legal issues. [See also moral issues, social issues.] 18 U.S.C. §1030 (a)(6) (Trafficking in Passwords) 18 U.S.C. §1030 (Computer Fraud and Abuse Act) 18 U.S.C. §1030(a)(3) (Trespassing on Government Computers) 18 U.S.C. §2510 (Wiretap Statute) access, legal definition Active Network Defense.
[See Active Network Defense (AND).] APIG (All Party Internet Group) applicable laws CERT/CC, reporting to chain of custody civil law 2nd class action suits computer data, as property criminal culpability criminal law 2nd damages aggregating cost-estimation model estimating hidden costs ICAMP (Incident Cost Analysis and Modeling Project) IRC (Internet Relay Chat) loss, definition 2nd trigger for federal statutes United States v. Middleton Department of Justice Cybercrime Web site domestic dual criminality electronic communication privacy EURIM (European Information Society Group) evidence collection extortion extradition frequency of legal involvement health care identifying perpetrators impairing access to data incident response procedures initiating legal proceedings international, current international, trends involving legal authorities jurisdictional issues LEGAT (legal attache) letters rogatory liability military responses MLATs (mutual legal assistance treaties) national defense NIPC (National Infrastructure Protection Center), reporting to PCCIP (President's Commission on Critical Infrastructure Protection) phone contacts prognosis record keeping reporting requirements reporting suspected crimes 2nd self-help options Tortious Interference with Business Relationship or Expectancy Trafficking in Passwords (18 U.S.C. §1030(a)(6)) trespassing on government computers U.S. legal system U.S. Secret Service, Electronic Crimes Branch, reporting to unauthorized, legal definition viability of prosecution victim negligence victim profile wiretaps LEGAT (legal attache) Legislation CMA (Computer Misuse Act) (United Kingdom) Computer Fraud and Abuse Act (18 U.S.C. §1030) Graham-Leach-Bliley Act HIPAA (Health Insurance Portability and Accountability Act) "Privacy Law" (Italy) United States v. Dennis 2nd USA PATRIOT Act of 2001 Wiretap Statute (18 U.S.C. §2510) Legitimate traffic.
[See service differentiation.] Letters rogatory Liability issues 2nd [See also legal issues.] libcap format Lion (1i0n) worm Litigation.
[See legal issues.] Locality principle Loki Loss estimates.
[See cost of attacks, damages.] Loss, legal definition Loveless, Mark (Simple Nomad) 2nd lsof
|