JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
L
L2TP
Label
Labeled Security Protection
Labeling
Lace Card
Lamer
LAN
LAN (Local Area Network)
LAN Manager
LAND attack
Land Mobile Service
Land Mobile Station
Land Station
Landscape Mode
Language
Language Lawyer
Language Processor
Languages Of Choice
LANMAN
Laptop Computer
Larval Stage
Lase
Laser
Laser Chicken
Laser Intelligence
Lasherism
LASINT
Last-In, First-Out
LATA
Latent fingerprint
Lattice
Lattice Model
Laundromat
Law Enforcement Interfaces
Laws, Regulations, And Other Public Policies
Layer 2 Tunneling Protocol (L2TP)
LDB
LEAD
Leaf Site
Leak
Leaky Heap
Leapfrog Attack
Learning aids
Leased-Line Networks
Least Privilege
Leech
Legacy security technology
Legal
Legal And Liability Issues
Legalese
Legitimate User
LER
LERP
Lessons Learned
Let The Smoke Out
Letterbomb
Level
Level I/II/III
Level Of Trust
Lexer
Lexiphage
Liberty Alliance
Life
Life Cycle
Life Cycle Security
Life Cycle System Security Planning
Life Is Hard
Life-Cycle
Life-Cycle Security
LIFO
Light Pipe
Lightweight
Like Kicking Dead Whales Down The Beach
Like Nailing Jelly To A Tree
Likelihood of a threat
LIMDIS
LIMFACS
Limited Access
Limited Access Area
Limited Access Security Mode
Limited ADP Access Security Mode
Limited Area
Limited Exclusion Area
Limited Maintenance
Limited Protection
Line
Line Authentication
Line Conduction
Line Conductors
Line Eater, The
Line Load Control
Line Noise
Line Of Sight
Line Starve
Linear Analog Synchronization
Linear Predictive Coding
Linear Programming
Linearithmic
Link
Link Control Protocol
Link Encryption
Link Farm
Link Layer
Link Level
Link Protocol
Linkage
Link-By-Link Encipherment
Link-By-Link Encryption
Link-Dead
Lint
Linux
LINUX distribution
Lion Food
Lions Book
LISP
List Oriented
List-Based Access Controls
List-Oriented
Literature Intelligence
Literature, The
Lithium Lick
LITINT
Little-Endian
Live
Live Data
Live Free Or Die!
Live testing
Livelock
Liveware
LKG
LLC
LLNL
LMD
LME
LMI
Lobotomy
Local Area Network
Local Area Network (LAN)
Local Area Network Security
Local Exchange Loop
Local Nationals
Local Users and Groups
Locals, The
LOCK
Lock down
Lock-And-Key Protection System
Locked And Loaded
Locked Up
Lockout
Log
Log entry
Logging
Logic bomb
Logical
Logical Access Control
Logical Circuit
Logical Completeness
Logical Completeness Measure
Logical Link Control Sublayer
Logical Signaling Channel
Logical Topology
Login
Login History
Login password
Login/log In
Log-Off
Logoff/log Off
Logon
Log-On
Logon/log On
Logs And Journals
Long Title
Long-Haul Communication
Long-Range Plan
Loop
Loop Through
Loop-Back
Loophole
Loose Bytes
Lord High Fixer
LOS
Lose
Lose Lose
Loser
Losing
Loss
Lossage
Lost Call
Lost In The Noise
Lost In The Underflow
Lots Of MIPS But No I/O
Low Power
Low Probability Of
Low Probability Of Detection
Low Probability Of Intercept
Low Water Mark
Low-Bandwidth
LP
LPC
LPD
LPI
LPT
LRIP
Ls
LSI
LTHE
Lubarsky's Law Of Cybernetic Entomology
Lunatic Fringe
Lurker
Luser
Line Conduction
Unintentional signals or noise induced or conducted on a telecommunications or automated information system signal, power, control, indicator, or other external interface line.
(TEMPEST) Emanations produced on any external or interface line of an equipment, which, in any way, alter the signal on the external or interface lines. The external lines include signal lines, control and indicator lines, and AC or DC power lines.
Line conduction emanations include all signals or noise which are induced or conducted on the external interface linesThe external interface lines include signal lines, control and indicator lines, power lines and any lines which interface an equipment to other equipment or systems.