JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
U
U
U. S. Controlled Facility
U. S. -Controlled Facility
U. S. Controlled Space
U. S. -Controlled Space
U. S. Nongovernmental Source
U. S. Person
UA
UBD
UDP datagram
UDP port scanning
UID (User ID)
UIRK
UIS
UK
Umask
UN*X
Unapproved Software
Unauthorized Disclosure
Unauthorized Disclosure Of Information
Unauthorized Modification
Unauthorized User
Unavailability
Unbundling
Uncertainty Calculus
Unclassified
Unclassified Controlled Nuclear Information
Unclassified Information
Unclassified Telecommunications Security
Uncontrolled Access Area
Undefined External Reference
Under The Hood
Underlap
Undesired Signal Data Emanations
Undocumented Feature
UNICODE directory traversal attack
Uniform Encoding
Uniformed security personnel
Uninteresting
Unit Element
Unit Interval
UNIX
UNIX Brain Damage
UNIX Conspiracy
UNIX Weenie
UNIX:
Unixism
Unnecessary services
Unnumbered Command
Unnumbered Response
Unprivileged User
Unprotect
Unprotected
Unreliable
Unsuccessful Call
Unswizzle
Untrusted Applications
Untrusted Element
Untrusted network
Untrusted Process
Unwind The Stack
Unwind-Protect
Up
Up-Converter
Update
Updating
Upgrade
Upgrade Parameter
Uplink
Upload
UPP
Upthread
Uptime
Urchin
URL
URL filtering
Usable Line Length
Usage
Use policy
Useful Line
Usenet
User
User Datagram Protocol (UDP)
User ID
User ID (UID)
User Identification
User Information
User Information Bit
User Information Block
User Partnership Program
User Profile
User/process Interface
User-Obsequious
USG UNIX
Utility Program
Utility Routine
UTSL
UUCPNET
UV
UNIX:
/yoo'niks/ n. [In the authors' words, "A weak pun on Multics"] (also `Unix') An interactive time-sharing system invented in 1969 by Ken Thompson after Bell Labs left the Multics project, originally so he could play games on his scavenged PDP-7. Dennis Ritchie, the inventor of C, is considered a co-author of the system. The turning point in UNIX's history came when it was reimplemented almost entirely in C during 1972--1974, making it the first source-portable OS. UNIX subsequently underwent mutations and expansions at the hands of many different people, resulting in a uniquely flexible and developer-friendly environment. By 1991, UNIX had become the most widely used multiuser general-purpose operating system in the world. Many people consider this the most important victory yet of hackerdom over industry opposition (but see UNIX weenie and UNIX conspiracy for an opposing point of view). See Version 7, BSD, USG UNIX. Some people are confused over whether this word is appropriately `UNIX' or `Unix'; both forms are common, and used interchangeably. Dennis Ritchie says that the `UNIX' spelling originally happened in CACM's 1973 paper because "we had a new typesetter and troff had just been invented and we were intoxicated by being able to produce small caps. " Later, dmr tried to get the spelling changed to `Unix' in a couple of Bell Labs papers, on the grounds that the word is not acronymic. He failed, and eventually (his words) "wimped out" on the issue. So both capitalizations are grounded in ancient usage.