JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
W
Wabbit
WAITS
Waiver
Walk
Walk Off The End Of
Walking Drives
Walkthroughs
Wall
Wall Follower
Wall Time
Wallpaper
WAN
WAN (Wide Area Network)
Wango
Wannabee
War Dialer
War driving
Ware*
Warez
War-fighting doctrine
Warlording
Warm Boot
Warrant
Warranties
Wart
Wash Software
Washing Machine
Water MIPS
WATS
Wave A Dead Chicken
Weak keys
Weapon Data
Weasel
Web bug
Web service
Web-based e-mail
Webservice
Website defacement
Wedged
Wedgie
Wedgitude
Weeble
Weeds
Weenie
Weenix
Well-Behaved
Well-Connected
Well-known port numbers
WEP (Wired equivalent privacy)
Wet Line
Wetware
Whack
Whacker
Whales
Whalesong
What's A Spline?
Wheel
Wheel Bit
Wheel Wars
White Book
White hat hackers
White Noise
Whitesmiths Style'*
Whois
WIBNI
Wide Area Network
Wide Area Network (WAN)
Wide Area Network Security
Wide Area Networks
Wide Area Telephone Service
Widget n.
Wi-Fi
Wiggles
WIMP Environment
Win
Win Big vi.
Win Win
Winchestern
Window
Window Shopping
Window SysIWYG
Windoze /win'dohz/
Winged Comments
Winkey
Winner
Wired
Wired equivalent privacy (WEP)
Wirehead /wi:r'hed/
Wireless Fidelity Alliance
Wireless LAN (WLAN)
Wireless NIC
Wireless Protected Access (WPA)
Wiretap warrant
Wiretapping
Wirewater
Wish List
Within Delta Of
Within Epsilon Of
Witness Interviewing/Interrogation
Wizard
Wizard Book
Wizard Mode
Wizardly
WLAN (Wireless LAN)
WNINTEL
Wok-On-The-Wall
Word
Word Length
Word Processing
Work Factor
Work Space
Work Station
Workaround
Work-around
Working As Designed
Workstations Security
World
World Wide Web (WWW)
Worm
Wormhole
Worms
Wound Around The Axle
WPA
Wrap Around
Write
Write Access
Write Cycle Time
Write Down
Write Head
Write Protection Label
Write Up
Write-Only Code
Write-Only Language
Write-Only Memory
Write-Protect Tab
Wrong Thing
Wugga Wugga
Wumpus
WWMCCS
WWW (World Wide Web)
WWW root
WYSIAYG
WYSIWYG
Write-Only Code
n. [a play on `read-only memory'] Code so arcane, complex, or ill-structured that it cannot be modified or even comprehended by anyone but its author, and possibly not even by him/her. A Bad Thing.