Internet access / software engineering technology / work products / Internet-based information security lab / modified utilities / configured host systems / software tools / hypothetical attack tool / trustworthy information security products / software practitioners / model solution / public key authentication algorithm / system software / public web site / modified system utilities / security engineering work products / find solutions / security policy then lab server / cryptographic algorithms / Internet-based information security laboratory / Internet-Based Information Security Lab Here / lab server / Internet-Based Information Security Lab An example / bank card / software solutions / interaction protocols / /
NaturalFeature
Communications Channel / /
OperatingSystem
Linux / Windows NT / /
Organization
Chris Fox Department of Computer Science James Madison University Harrisonburg / COMMON CRITERIA IMPLEMENTATION BOARD / Gannon University / /
Person
Dispatcher / Addison Wesley / Script Kiddie / Mary Smith / Nazgul / Malicious Student / Chris Fox / John McDermott / /
Position
editor / actor / teller / Manager / security specialist / manager of a target host / Q. The RRA97 model for role-base administration / Clerk / abuse case model for the Internet-based information security lab / available file manager / file manager / abusing actor / manager / debugger / editor / tools and systems actor / root/administrator / administrator / manager / a debugger / a programming editor / Lab Administrator / /
Product
Warez 2 / /
ProgrammingLanguage
Unified Modeling Language / /
ProvinceOrState
California / Arizona / /
PublishedMedium
The Student / /
Technology
IPv6 / Fast Ethernet / Point-to-Point Tunneling Protocol / Linux / Information Technology / ATM / secure shell / TCP/IP protocol / operating systems / public key authentication algorithm / interaction protocols / software engineering technology / IPv4 / network protocols / GUI / /