SUSE LINUX Enterprise Server 9 Administrators Handbook

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

IBM Web site

IBSS

     (independent basic service set)

identity provisioning

ifconfig command

implementation

     backups 2nd 3rd 4th 5th 6th 7th 8th 9th

         consideration points 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         databases 2nd 3rd 4th 5th 6th

         GFS rotation scheme 2nd 3rd 4th

         Tower of Hanoi rotation scheme 2nd 3rd

implicit classes

incident response

     security policies 2nd 3rd 4th

incremental backups 2nd

     GFS rotation scheme

independent basic service set [See IBSS]

inetd

     (Internet services daemon)

Info Security

     Web site

information

    security

         corporate policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th

Information Technology Security Evaluation Criteria (ITSEC)

     security ratings

infrastructure mode

     WLANs

init command

init program

     runlevels 2nd 3rd 4th

Initialization Vector

input

    redirection

         bash shell

input mode

     vi text editor

Insecure.org Web site

installation

     manual download

     packages

     SLES 2nd 3rd 4th 5th

         AutoYaST 2nd

         CD-ROM 2nd 3rd

         configuration

         hard disks 2nd

         hardware configuration 2nd 3rd

         language preference

         method selection 2nd 3rd

         network connectivity 2nd 3rd

         networks 2nd

         online updates

         pre-installation planning 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

         service configuration 2nd

         settings 2nd 3rd 4th

         troubleshooting 2nd 3rd

         user settings 2nd 3rd

         VNC-based method 2nd 3rd 4th 5th 6th 7th 8th

interfaces

     printer types

     YaST

Internet Security Systems Web site

Internet services daemon [See inetd]

Internet Storm Center Web site

intrusion detection

     assessing vulnerabilities 2nd 3rd

         Nessus tool 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

         nmap tool 2nd 3rd 4th 5th 6th

     defining 2nd 3rd 4th 5th

     host intrusions 2nd

         AIDE (Advanced Intrusion Detection Environment) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         chkrootkit 2nd 3rd 4th

         log files 2nd

     network-based intrusions 2nd

         ACID (Analysis Console for Intrusion Databases) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

         NIDS (Network Intrusion Detection Systems) 2nd 3rd 4th

         Snort 2nd 3rd 4th 5th

         traffic flow restrictions 2nd 3rd

     reducing exposure 2nd 3rd 4th 5th 6th

    tools

         Cacti 2nd 3rd 4th

         Ethereal 2nd 3rd 4th 5th 6th

         MRTG 2nd 3rd 4th

         scanning 2nd 3rd

Intrusion Detection Systems (LIDS) Web site

IP addresses

     remote access 2nd 3rd

ippl

iptables

     packet filtering 2nd 3rd 4th 5th 6th 7th 8th 9th

IPTraf

irc user

     default UID

IrDA interface type

itox utility

ITSEC (Information Technology Security Evaluation Criteria)

     security ratings

IV

     (Initialization Vector)

Категории