JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
R
R Services
R&D
RAC
RACE
Radar Intelligence
Radiant Energy
Radiant Power
Radiated Signal
Radiation
RADINT
Radio
Radio Fingerprinting
RADIUS (Remote Authentication Dial-In User Service) Server
Rain Dance
Rainbow Series
RAM
Ramp
Random
Random Access Memory
Random Noise
Random Number
Random Numbers
Randomizer
Randomness
Rare Mode
RAS (remote access server)
Raster Blaster
Raster Burn
RAT
Rat Belt
Rating
Rating Maintenance Phase
Rating Maintenance Plan (RM-Plan, RM Plan)
Rating Maintenance Report (RMR)
Ratings Maintenance Phase (ramp)
Ratings Maintenance Plan
Rave
Rave On!
Raw Mode
Rc File
Rc Scripts
RC4
RCCI
RD
Read
Read Access
Read Down
Read Head
Read Up
Read/write Opening
Read/write Slot
Reading
README File
Read-Only Memory
Read-Only Storage
Read-Only User
Real
Real Estate
Real Hack
Real Operating System
Real Programmer
Real Soon Now
Real Time
Real User
Real World
Reality Check
Realization
Realization Cost
Realm
Real-time
Real-time backup
Real-Time Reaction
Reaper
Reasonability Checks
REASSURE
Re-authentication
Receive Only
Recertification
RechRef
Recognition
Recommended practices
Reconciliation
Record
Record Communication
Record Information
Record Medium
Record Sheet
Record Traffic
Recorded Copy
Recording
Recording Density
Recoverable Zone
Recovery
Recovery agent
Recovery Procedure
Recovery Procedures
Rectangle Slinger
Recursion
Recursive Acronym
RED
Red Book
RED Conductor
RED Designation
RED Equipment
RED Equipment Area
Red Key
RED Line
RED Signal
RED Signal Line
Red Wire
RED/BLACK Concept
Redirect
Redundancy
Redundancy Check
Redundant Code
Reference Model of Open Systems Interconnection (OSI)
Reference Monitor
Reference Monitor Concept
Reference Monitors
Reference Validation
Reference Validation Mechanism
Refresh
Regeneration
Regexp
Register
Register Dancing
Registered port numbers
Regrade
Rehearsal
Reimbursement
Reincarnation, Cycle Of
Reinvent The Wheel
Re-keying
REL
Release Prefix
Reliability
Reliability Testing
Reliable
Religion Of CHI
Religious Issues
Remanance
Remote Access
Remote Access Data Processing
Remote access server (RAS)
Remote access VPNs
Remote administration Trojans (RATs)
Remote Authentication Dial-In User Service (RADIUS) Server
Remote Batch Entry
Remote Batch Processing
Remote Call Forwarding
Remote Control Equipment
Remote Job Entry
Remote Rekeying
Remote Terminal Area
Remote Terminal Protection Devices
Remotely Accessed Resource-Sharing Computer System
Removable Disk Media
Removable Storage Media
Repair
Repair Action
Repertory Dialer
Replacement Cost
Replay attack
Replicator
Report
Represented Asset Value
Reproducibility
Repudiation
Request
Request Data Transfer
Request for comment (RFC)
Requirements Traceability
Resale Parameter
Rescind
Reserve Keying
Reserve Keying Material
Reserved Word
Reset (RST)
Resident Memory
Residual Risk
Residue
Resource
Resource Encapsulation
Resource Sharing
Resource-Sharing Computer System
Response
Response Frame
Response message
Response Time
Responsibilities
Responsibility
Restart
Restitution
Restore
Restricted Access
Restricted Area
Restricted Data
Restricted Service
Restriction
Retcon
Retention
RETI
Retinal scanning
Retrieval
Retrieval Function
Retrieval Service
Retrocomputing
Retro-Virus
Return address
Return From The Dead
Return on investment (ROI)
Reusable password
Revenue
Review And Approval
Revocation
RF
RFC
RFC (request for comment)
RFC [AuQ5][AuQ5]822
RFC 2822
RFE
RFP
Rib Site
Rice Box
Right Thing
Ring Back
Risk
Risk acceptance
Risk Acceptance Process
Risk Analysis
Risk And Magnitude Of The Harm
Risk Assessment
Risk Index
Risk Management
Risk reduction
Risk transference
RKV
RL
Rlogin
RM Plan
RM-Plan
RMR
RO
Roach
Robot
Robust
Rococo
Rogue
ROI (Return on investment)
Role-Based Access Controls
Roles
Roles And Responsibilities
ROM
Root
Root Mode
Rootkit
Rot13
Rotary Debugger
Rotation of duties
Round Tape
Route
Router NIDS
Routine
Routing Control
Roving wiretaps
RPM
RQT
RSA
Rsh
RSN
RST (Reset)
RTBM
RTFAQ
RTFB
RTFM
RTFS
RTI
RTM
RTS
Rude
Rule
Rule Of Least Privilege
Rule-Based Access Controls
Rule-Based Security Policy
Rules-Based Access Controls
Run
Run mode
RunAs
Runes
Runic
Run-Length Encoding
Rusty Iron
Rusty Memory
Rusty Wire
RWX
Roach
vt. [Bell Labs] To destroy, esp. of a data structure. Hardware gets toasted or fried, software gets roached.