It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]

umask value, default, 186

uninterrupted power supply (UPS), 85, 95

Unix and Linux operating systems auditing, 165-205

account management and password controls

master checklist, 203-204

test steps, 173-182

audit logs

master checklist, 205

test steps, 196-199

background, 165-166

file security and controls

master checklist, 204

test steps, 182-188

file system layout, navigation, and permissions, 167-170

knowledge base, 202-203

LDAP, NIS, or NIS+, 171-172

network security and controls

master checklist, 205

test steps, 188-195

overview, 165

security monitoring and other controls

master checklist, 205

test steps, 199-201

tools and technology, 201-202

Chkrootkit, 201-202

John Ripper and Crack, 202

Nessus, 201

NMAP, 201

overview, 201

Shell/Awk/etc, 202

users and authentication, 170-171

overview, 170

Unix Group File, 171

Unix Password File, 170

Unix Shadow File, 170-171

unmanaged devices, 277

UPS (uninterrupted power supply), 85, 95

URLScan, 210

user access, 257, 258. See also authentication

user accounts, 146-147, 173-180

user IDs, 75, 174

user rights, Windows Server, 150-151

users and authentication, 170-171

overview, 170

Unix Group File, 171

Unix Password File, 170

Unix Shadow File, 170-171

utmp file, 199

Категории