Back to Results
First PageMeta Content
National security / Computing / Software requirements / Software project management / Computer network security / Abuse / Information security / Ident / Computer security / Security / Software development / Crime prevention


Document Date: 2001-11-19 15:09:42


Open Document

File Size: 57,00 KB

Share Result on Facebook

Company

InternetBased Information Security Laboratory / Prentice-Hall / Microsoft / /

Currency

USD / /

/

Event

Reorganization / /

IndustryTerm

Internet access / software engineering technology / work products / Internet-based information security lab / modified utilities / configured host systems / software tools / hypothetical attack tool / trustworthy information security products / software practitioners / model solution / public key authentication algorithm / system software / public web site / modified system utilities / security engineering work products / find solutions / security policy then lab server / cryptographic algorithms / Internet-based information security laboratory / lab server / bank card / software solutions / interaction protocols / /

NaturalFeature

Communications Channel / /

OperatingSystem

Linux / Windows NT / /

Organization

Chris Fox Department of Computer Science James Madison University Harrisonburg / COMMON CRITERIA IMPLEMENTATION BOARD / Use Case Model For An InternetBased Information Security Lab Tear Down Lab / /

Person

Dispatcher / Here / Script Kiddie / Mary Smith / Nazgul / Malicious Student / Chris Fox / John McDermott / /

Position

editor / actor / teller / security specialist / manager of a target host / Clerk / abuse case model for the Internet-based information security lab / available file manager / file manager / abusing actor / manager / debugger / editor / complete use case model / tools and systems actor / Lab Target File Manager / root/administrator / Debugger Exercise Implementation Exercise Documentation Editor / Administrator / manager / a debugger / a programming editor / Manager The / lab Administrator / /

PublishedMedium

The Student / /

Technology

IPv6 / Fast Ethernet / Linux / Information Technology / ATM / secure shell / TCP/IP protocol / operating systems / public key authentication algorithm / interaction protocols / software engineering technology / IPv4 / network protocols / GUI / /

SocialTag