685 hashing algorithms, 316 Directory UMM :Networking Manual:

SKIP Simple Key Management for Internet Protocols tool, 75, 104, 712 Skipjack algorithm, 320, 713 SLAs Service Level Agreements in contracts, 515 defined, 711 for hardware, 648 issues addressed by, 247 SLE single loss expectancy, 191 defined, 712 in impact assessment, 518 SLIP Serial Line Internet Protocol, 74, 105, 711 smart cards, 637, 713 SMDS Switched Multimegabit Data Services, 108, 130, 716 smoke actuated systems, 645 smoke damage, 647 smoke stage in fires, 643, 644 SMP symmetric multiprocessing, 372, 716 SMTP Simple Mail Transfer Protocol in Application layer, 77, 95 defined, 712 in WANs, 132 Smurf attacks, 54, 55, 273–274, 274, 713 sniffer attacks, 57, 713 sniffing, 489, 713 SNMP Simple Network Management Protocol in Application layer, 77, 96 for scans, 611 snooping attacks, 57 social engineering, 12, 491 defined, 713 in password attacks, 270 through voice communications, 136–137 sockets, 713 software confiscating, 614–615 copyrights for, 579 developing, 229 assurance procedures, 229–230, 231 object-oriented programming, 233–234 programming languages in, 232 system failure avoidance, 230–231, 231 escrow arrangements for, 557–558 failures in, 543 testing, 243–244 software capability maturity model, 239–240 software IP encryption SWIPE protocol, 104, 713 SPA Anti-Piracy group, 584 spam, 713 spamming attacks, 57–58, 134, 713 SPAP Shiva Password Authentication Protocol, 124 spikes, 641, 713 spiral model, 238–239, 239 split knowledge, 304, 713 spoofing with ARP, 141 defined, 714 in e-mail, 134 IP, 280–281 spoofing attacks, 55–56, 714 sprinklers, 646 SPX Sequenced Packet Exchange, 76, 711 SQL Structured Query Language, 76, 218–219, 715 SS Property Simple Security Property, 400, 419, 712 SSH Secure Shell, 355–356, 710 SSL Secure Sockets Layer protocol, 104 defined, 710 in Session layer, 76, 96 for Web, 353 X.509 for, 347 SSO Single Sign On mechanism, 20 defined, 712 examples, 22–23 Kerberos authentication in, 21–22 standards, 184 for computer security, 576 defined, 714 star topology, 88, 88 state changes, 439 state laws, 573 state machine model, 397–398, 714 state packet-filtering firewalls, 714 stateful inspection firewalls, 98, 714 stateful NAT, 126 statements in business continuity planning of importance, 523–524 of organizational responsibility, 524 of priorities, 524 of urgency and timing, 524 states defined, 714 process, 377–378, 378 static electricity, 642 static NAT, 93 static packet-filtering firewalls, 97–98