JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
K
KAK
KB
KBAF
KBE
KDC
KE
KEK
Kerberos
Kerberos authentication service
Kerberos server
Key distribution center
Key escrow
Key exchange
Key features
Key length
Key ring
Key-Hashed Message Authentication Code (HMAC)
Keystroke capture program
Keystroke recognition
KG
Kiddie script
Kill
Killer Poke
Kilo
KIPS
KISS Principle
Kit
Klone
Kludge
Kluge
Kluge Around
Kluge Up
KMASE
KMC
KMID
KMODC
KMP
KMPDU
KMS
KMSA
KMUA
Knights Of The Lambda Calculus
Know How
Knowledge Base
Known vulnerability
Knuth
KP
KPK
Kremvax
KSOS
KVG
KVM/370
Kyrka
Kluge
/klooj/ [from the German `klug', clever] n. A Rube Goldberg (or Heath Robinson) device, whether in hardware or software.
n. A clever programming trick intended to solve a particular nasty case in an expedient, if not clear, manner. Often used to repair bugs. Often involves ad-hockery and verges on being a crock.
n. Something that works for the wrong reason.
vt. To insert a kluge into a program. "I've kluged this routine to get around that weird bug, but there's probably a better way. "
[WPI] n. A feature that is implemented in a rude manner. Nowadays this term is often encountered in the variant spelling `kludge'. Reports from old farts are consistent that `kluge' was the original spelling, reported around computers as far back as the mid-1950s and, at that time, used exclusively of *hardware* kluges. In 1947, the "New York Folklore Quarterly" reported a classic shaggy-dog story `Murgatroyd the Kluge Maker' then current in the Armed Forces, in which a `kluge' was a complex and puzzling artifact with a trivial function. Other sources report that `kluge' was common Navy slang in the WWII era for any piece of electronics that worked well on shore but consistently failed at sea. However, there is reason to believe this slang use may be a decade older. Several respondents have connected it to the brand name of a device called a "Kluge paper feeder", an adjunct to mechanical printing presses. Legend has it that the Kluge feeder was designed before small, cheap electric motors and control electronics; it relied on a fiendishly complex assortment of cams, belts, and linkages to both power and synchronize all its operations from one motive driveshaft. It was accordingly tempermental, subject to frequent breakdowns, and devilishly difficult to repair -- but oh, so clever! People who tell this story also aver that `Kluge' was the the name of a design engineer. There is in fact a Brandtjen & Kluge Inc. , an old family business that manufactures printing equipment -- interestingly, their name is pronounced /kloo'gee/! Henry Brandtjen, president of the firm, told me (ESR, 1994) that his company was co-founded by his father and an engineer named Kluge /kloo'gee/, who built and co-designed the original Kluge automatic feeder in 1919. Mr. Brandtjen claims, however, that this was a *simple* device (with only four cams); he says he has no idea how the myth of its complexity took hold. TMRC and the MIT hacker culture of the early '60s seems to have developed in a mi