Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DAC (Discretionary Access Controls)  

Daemen, Joan  

daemon user  

daemons  

Dalheimer, Mattias K. (Running Linux)  

Dalton, Chris I.  

DARPA   [See ARPA]

data   [See also data protection; information]

       backing up   [See backups ]

       confidentiality of   [See confidentiality]

       encryption of   [See encryption]

       integrity of   [See integrity]

data bits  

Data Carrier Detect (DCD)  

data communication equipment (DCE)  

Data Encryption Algorithm (DEA)  

Data Encryption Standard   [See DES]

data protection   2nd   [See also backups]

       eavesdropping  

       local storage  

       real-world example  

       sanitizing media before disposal  

       theft, from  

       unattended terminals  

Data Set Ready (DSR)  

data spoofing  

data terminal equipment (DTE)  

Data Terminal Ready (DTR)  

databases   [See also network authentication systems]

       network  

       system  

date account  

Dawson, Terry (Running Linux)  

day-zero backup   [See level-zero backup]

daytime service   2nd  

dbx debugger  

DCD (Data Carrier Detect)  

DCE (data communication equipment)  

DCE (Distributed Computing Environment)   2nd   3rd   4th   5th   6th  

dd command   2nd  

DDoS (Distributed Denial of Service) attacks  

DEA (Data Encryption Algorithm)  

deadlock  

DEBUG command, SMTP  

debugfs command   2nd   3rd  

DECnet  

decode aliases  

decoy systems  

decryption  

default accounts  

default domain  

defense in depth   [See multilevel security]2nd   [See multilevel security]

demo accounts  

denial of service attacks   2nd  

       accidental  

       automatic account lockout  

       causes of  

       destructive   2nd  

       distributed (DDoS)  

       internal inetd services  

       logging to /dev/console causing  

       on networks  

       overload   2nd  

       security checklist for  

       syslog causing  

       types of  

Denning, Dorothy E. R. (Cryptography and Data Security)  

Denning, Peter J. (Computers Under Attack: Intruders, Worms, and Viruses)  

Department of Justic (DOJ)  

deployment environments  

depository directories, FTP  

DES (Data Encryption Standard)   2nd  

       example of  

       Kerberos using  

       key length of  

       NIS+  

       weakness of  

des command   2nd  

DES Extended format  

The Design and Implementation of the 4.4 BSD UNIX Operating System (McKusick, Marshall Kirk; Bostic,  

The Design of the UNIX Operating System (Bach, Maurice)  

destroying media  

destructive denial of service attacks   2nd  

detectors

       cable tampering  

       carbon monoxide  

       fire alarms  

       humidity  

       logging alarm systems  

       motion  

       placement and monitoring of  

       smoke  

       temperature alarms  

       water sensors  

/dev directory

       /dev/audio device  

       /dev/console device  

       /dev/kmem device   2nd  

       /dev/null device  

       /dev/random device  

       /dev/swap device  

       /dev/urandom device  

device files  

devices

       access, legal definition of  

       back door in  

       backup, world-readable  

       configuring on local area network  

       logging information about  

       managing with SNMP  

       modem control  

       random number sources  

       superuser control of  

Devices file  

df -i command  

dfstab file   2nd  

dfstab script  

DHCP protocol  

dictionary attack  

diff program  

differential backup  

differential cryptanalysis  

differential fault analysis  

differential power analysis  

differential timing analysis  

Diffie, Whitfield   2nd  

       "New Directions in Cryptography"  

       "The First Ten Years of Public-Key Cryptography"  

Diffie-Hellman exponential key exchange system   2nd   3rd   4th   5th   6th  

Digital Millennium Copyright Act (DMCA)  

Digital Signature Algorithm (DSA)  

Digital Signature Standard (DSS)   2nd  

digital signatures   2nd   [See also signatures, data]

       distributed with software  

       DSA (Digital Signature Algorithm)  

       DSS (Digital Signature Standard)   2nd  

       HMAC as alternative to  

       message digest algorithms used for   2nd  

       public key cryptography used with   2nd  

       RSA as basis for  

directories   2nd   3rd   [See also files]

        ancestor , detecting changes to  

       CDFs (context-dependent files)  

       current  

       FTP depositories  

       home  

               security of  

       links to  

       mounted  

       nested, tree structure attacks on  

       NFS   [See NFS]

       permissions for   2nd  

       SGID and sticky bits on  

       world-writable  

directory services   [See Kerberos system LDAP NIS NIS+]

dired mode, GNU Emacs  

Disappearing Cryptography (Wayner, Peter)  

disaster planning   2nd  

Disaster Recovery Journal  

discard service   2nd  

Discretionary Access Controls (DAC)  

disk drives   [See also media]

       destructive attacks to  

       difficulty of sanitizing  

       filling up, as overload attack  

       Firewire-based  

       hidden space on  

       logging information about  

       partitioning  

       partitions, backups by  

       quotas for  

       reserved space on  

       write-protect switches for   2nd  

Distributed Computing Environment   [See DCE]2nd   [See DCE]

Distributed Denial of Service (DDoS) attacks  

DMCA (Digital Millennium Copyright Act)  

DNS (Domain Name System)   2nd  

       attacks on  

       client flooding  

       dynamic  

       nameserver attacks  

       nameserver cache poisoning  

       Public Key Infrastructure (PKI)  

       rogue servers  

       security and   2nd  

       security precautions for  

       zone transfers   2nd  

DNS and BIND (Albitz, Paul and Liu, Cricket)  

DNSSEC  

Dobbertin, Hans  

documentation

       of break-in  

       log books  

       log files, hardcopy of   2nd  

       manuals   2nd  

       software  

DOJ (Department of Justice)  

dollar sign ($), as Unix Bourne or Korn shell prompt  

domain name   2nd  

Domain Name System   [See DNS]

domain service   2nd  

domain socket  

domainname command  

domains (NIS)  

dormant accounts  

       disabling automatically  

       disabling by changing password  

       finding  

dot (.) directory   2nd  

dot-dot (..) directory   2nd  

double reverse lookup  

downtime, logging  

dpkg package management system  

drand48() system call  

Dreyfus, Suelette (Underground)  

drinks, effects on hardware  

DSA (Digital Signature Algorithm)  

DSR (Data Set Ready)  

DSS (Digital Signature Standard)   2nd  

DTE (data terminal equipment)  

DTR (Data Terminal Ready)  

du command  

due care   [See best practices]

dump program   2nd   3rd  

DUMP request  

dumpster diving  

duress code  

dust, effects on hardware  

DVD, mounted read-only  

dynamic DNS  

Категории