Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

earthquakes  

Eastlake, Donald  

eavesdropping   2nd  

       IP packets   2nd  

       real-world example  

       on wireless LANs  

       wiretapping  

       X clients  

echo service   2nd   3rd  

editors

       Emacs   2nd   3rd   4th  

       ex   2nd   3rd  

       startup file attacks  

       Trojan horses in files read by  

       vi   2nd   3rd  

edquota command  

education in security   2nd   3rd  

EEI (Escrowed Encryption Initiative)  

EFF (Electronic Frontier Foundation)  

effective GIDs  

effective UIDs   2nd   3rd  

egress filters  

electrical fires  

electrical noise, effects on hardware  

electrical surges   [See power, surges]

electronic eavesdropping  

Electronic Frontier Foundation (EFF)  

Electronic Privacy Information Center (EPIC)  

elliptic curve cryptosystems  

Ellison, Carl  

Emacs editor   2nd   3rd   4th  

.emacs file  

email   2nd   [See also sendmail program]

       alias back door  

       aliases   2nd  

       authentication and  

       delivered to programs  

       encrypting  

       end- user programs for (MUAs)  

       logging  

       mail programs for (MTAs)  

       overflowing system mailboxes  

       phantom, monitoring  

       protecting queue and delivery areas  

       retrieving from server  

       security and  

       SMTP service for  

       startup file attacks  

       Trojan horses in  

       unwanted (spam)   2nd  

       viruses   2nd  

embedded edit commands  

embedded Unix systems  

embezzlers, planting programmed threats  

emergency response organizations   [See response teams ]

employees   [See also users]

       absenteeism of  

       background checks of   2nd  

       confidential information about  

       cost of losing   2nd  

        departure of  

       education in security   2nd   3rd  

       investigations of  

       irreplaceable  

       key  

       least privilege principle and  

       loss of   2nd  

       mistakes made by  

       monitoring for stress  

        notifying of security policies  

       passwords compromised by  

       performance reviews of  

        polygraph tests of  

       printed information about  

       role in security  

       security checklist for  

       security regarding  

       security threats caused by   2nd  

       separation of duties and  

       temporary  

       trusting  

encryption   [See also cryptography]2nd  

       algorithms   2nd  

               cryptographic strength of  

               public key   2nd   3rd  

               symmetric key  

       application-level  

       attacks on   [See key search attacks]

       authentication with  

       of backups   2nd   3rd  

       DCE and  

       eavesdropping, protecting from  

       of email   2nd  

       end-to-end  

       of filesystems  

       keys   2nd  

       link-level  

       loopback  

       for modems   2nd  

       of backups[encryption

               backups)  

       of passwords   2nd   3rd   4th   5th  

               Samba  

       published resources on  

       salt and  

       Secure RPC not providing  

       security checklist for  

       SSH protocol and  

       as theft precaution  

end-to-end encryption  

Engert, Kai  

enterprise networks  

environment variables

       IFS   2nd   3rd  

       not using when programming  

       PATH   2nd  

       startup attacks and  

environmental dangers   2nd  

       backups erased by  

       carbon monoxide  

       dust  

       earthquakes  

       electrical noise  

       explosions  

       fire  

       food and beverages, accidents with  

       humidity  

        insects  

       lightning   2nd  

       temperature extremes  

       vibrations  

       water  

envp  

EPIC (Electronic Privacy Informatin Center)  

equipment   [See hardware]

escape sequences, modems and  

Escrowed Encryption Initiative (EEI)  

espionage  

/etc directory

       attacker changing owner of  

       /etc/default/login file  

       /etc/exports file  

       /etc/fsck program  

       /etc/fstab file  

       /etc/ftpd   [See ftpd server]

       /etc/ftpusers file  

       /etc/ group file   2nd   3rd  

       /etc/ hosts file  

       /etc/hosts.lpd file  

       /etc/inetd   [See inetd program]

       /etc/inetd.conf file  

       /etc/init program  

       /etc/inittab file   2nd   [See also inittab program]

       /etc/keystore file  

       /etc/named.conf file  

       /etc/passwd file   2nd   3rd   4th   5th  

       /etc/profile file   2nd  

       /etc/ publickey file  

       /etc/rc directory   2nd  

       /etc/rc script  

       /etc/remote file  

       /etc/renice   [See renice command]

       /etc/secure/passwd file  

       /etc/security/passwd.adjunct file  

       /etc/services file  

       /etc/shadow file   2nd  

       /etc/ shells file  

       /etc/ttys file   2nd  

       /etc/utmp file   2nd   3rd  

       /etc/yp/makedbm program  

       making files unwritable in  

       in restricted filesystems  

ethereal program  

Ethernet, addresses for random seeds  

Ethers table (NIS+)  

EUID   [See effective UIDs]

ex editor   2nd   3rd  

exceptions  

exec command  

exec service  

exec() system call   2nd  

execl() system call  

execlp() system call  

execute permission  

       directories  

       files  

execv() system call  

execve () system call  

execvp() system call  

exim program  

explosions  

EXPN command, SMTP   2nd   3rd  

exponential key exchange system  

export controls and cryptography  

EXPORT request  

exportfs command  

exports file   2nd   3rd   4th   5th  

.exrc file  

ext2fs filesystem (Linux)   2nd   3rd  

ext3fs filesystem  

external data representation   [See XDR]

extortionists

       authoring programmed threats  

       planting programmed threats  

Категории