Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

absolute pathnames  

Absolute Software Corporation  

abuse account  

access

        open  

       physical, to hardware   2nd  

access control  

       access control lists   [See ACL]

       file permissions   [See permissions]

       Internet servers  

       NIS+ objects   2nd  

       physical access to computers   [See physical security]

       restricted filesystems  

       X Window System  

access devices  

ACCESS function (RPC)  

access() system call  

access_log file  

accidents   [See environmental dangers]

accounting, process  

accounts  

       aliases for  

       changing login shell   2nd  

       changing password  

       created by intruders  

       default  

       demo  

        dormant  

       expiring  

        group  

       historical  

       importing to NIS server   2nd   3rd  

       Joes   2nd  

       locking automatically  

       logging changes to  

        names commonly attacked  

       names for   [See usernames]

       open   2nd  

       restricted, with rsh  

       root, protecting  

       running single command  

       security checklist for  

       synchronized passwords on  

       viewing in network database  

       without passwords  

acct file   2nd   3rd  

acctcom program  

accton command  

ACK bit  

ACL (Access Control List)  

       indicated by + in file permission  

       NNTP with  

       part of Unix security standard  

ACM (Association for Computing Machinery)   2nd  

active FTP  

activists

       as authors of programmed threats  

       planting programmed threats  

aculog file   2nd  

adb

       command  

       debugger  

add-on functionality  

addresses

       CIDR  

       Internet   [See IP addresses]

Adleman, Leonard M.  

       "A Method for Obtaining Digital Signatures"  

admintool command  

Advanced Encryption Standard (AES)  

Advanced Research Projects Agency (ARPA)  

air ducts, access through  

AIX

       file for new shells  

       history of  

       preventing users from changing passwords  

       silent ignore.* in syslog.conf  

       trusted path  

alarms   [See detectors]

Albitz, Paul (DNS and BIND)  

algorithmic attacks on encryption  

aliases

       account  

       decode  

       email   2nd  

               back door using  

       file for   2nd   3rd   4th  

       phantom email, avoiding with  

All Tomorrow's Parties (Gibson, William)  

Allman, Eric  

allow-transfers directive  

Amanda backup system   2nd   3rd  

amanda user  

Amateur Action Bulletin Board System  

American Civil Liberties Union v. Reno  

American Society for Industrial Security (ASIS)  

Amoroso, Edward (Fundamentals of Computer Security Technology)  

analog program  

analytic attacks on encryption  

ancestor directories, detecting changes to  

Anderson, Ross (Security Engineering)  

ANI (Automatic Number Identification)   2nd  

anlpasswd package  

anonymous FTP   2nd   3rd  

ANSI

       C compiler  

       C standards  

answer mode  

answer testing, modems  

answerback terminal mode, Trojan horses and  

Apache web servers

       always running  

       buffer overflows in  

       crypt() needed to verify passwords  

       logging from  

        requests increasing forked processes  

       security problems with  

       SSL library for  

       Tripwire for  

APOP option (POP)  

append-only files  

AppleTalk protocol  

application-level encryption  

Applied Cryptography: Protocols, Algorithms, and Source Code in C (Schneier, Bruce)  

ar program   2nd  

archiving information   2nd   [See also backups ]3rd  

arguments, checking  

arp command  

ARP table, printing contents of  

ARPA (Advanced Research Projects Agency)  

ARPANET network  

arpwatch program  

ASIS (American Society for Industrial Security)  

assert macro  

assessing risks   2nd  

assets

       identifying  

       identifying threats to  

       physical  

Association for Computing Machinery   [See ACM]

asymmetric key algorithms   2nd   [See also public key algorithms]

Asynchronous Transfer Mode (ATM)  

@ Large (Freedman, David H. and Mann, Charles C.)  

at program   2nd  

at sign (@), in xhost list  

AT&T System V   [See System V Unix]

Athena, Project   2nd   [See also Kerberos system]

atime   2nd  

Atkins, Derek  

Atkins, E. Todd   2nd  

ATM (Asynchronous Transfer Mode)  

attackers , computer   [See intruders]

audio device  

audit IDs   2nd  

audit trail   2nd   [See also log files]

auditing   2nd   [See also logging]3rd  

       C2 audit  

       compliance audit  

       security checklist for  

       transaction audit  

       user access to equipment  

auth service   2nd  

AUTH_DES authentication   2nd   3rd  

AUTH_KERB authentication  

AUTH_NONE authentication  

AUTH_UNIX authentication   2nd   3rd  

authd service  

authdes_win variable  

authentication  

       email and  

       ident, for TCP/IP  

       IP services  

       Kerberos  

       LDAP  

       of logins  

       message digests  

       Netnews messages  

       for network systems   [See network authentication systems]

       PAM  

       public key   2nd   3rd  

       RPC  

       Samba   2nd  

       Secure RPC  

       security checklist for   2nd  

       SMB  

       SSH client  

       SSH host  

       standards for  

       xhost facility  

authenticators   2nd   [See also passwords]

Authenticode  

authorization   [See authentication]

authwarnings option, sendmail  

Auto_Mounter table (NIS+)  

autologout shell variable  

Automatic Number Identification   [See ANI]

automatic systems

       abuse of  

       for backups  

availability of services  

awareness, security   [See security, user awareness of]

awk scripts, Trojan horses in  

Категории