Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

I/O   [See input/output, portable library]

ICMP (Internet Control Message Protocol)   2nd   3rd  

Icove, David (Computer Crime: A Crimefighter's Handbook)  

id command  

IDEA (International Data Encryption Algorithm)  

ident daemon   2nd  

identd daemon  

Identification Protocol  

identifiers   2nd   [See also GIDs; UIDs; usernames]

Idora (Gibson, William)  

IDS (intrusion detection system)  

IEEE Computer Society  

IFIP Technical Committee 11  

IFS variable   2nd   3rd  

IGMP (Internet Group Management Protocol)  

IM (Instant Messaging)  

IMAP (Internet Message Access Protocol)  

imap service  

IMAPS (secure IMAP)  

immutable files  

in.named daemon  

incremental backup  

indecency laws  

index nodes   [See inodes]

industrial spies  

inetd program   2nd  

       -t (trace) option  

       back doors in  

       configuration changes in  

       denial of service attacks with  

       replacing with tcpserver program  

       TCP Wrappers and   2nd  

        throttle for  

inetd.conf file   2nd   3rd   4th   5th  

information

       as an asset  

       availability of  

       confidentiality of   [See confidentiality]

       disclosed by programmed threats  

       integrity of   [See integrity]

        owners of  

Information Security  

Information Systems Security Association (ISSA)  

information warfare researchers  

InfoSecurity News (SC Magazine)  

init process  

init program  

initialization errors  

initialization files, system  

inittab file  

inittab program   2nd  

inodes  

       change time   [See ctime ]

       detecting changes in  

       for device files  

       running out of, as overload attack  

input/output (I/O), portable library  

insects , effects on hardware  

Insecure.org web site  

installation

       cables  

       new Unix system  

       software, logging  

Instant Messaging (IM)  

insurance

       actions against intruders required to recover losses  

       contingency plans for break-ins and  

       coverage for business interruption  

       coverage for damage by law enforcement  

       data on probability of loss   2nd  

       filing claims with  

       identifying coverage   2nd  

       inventory required to recover losses from  

       log files helping recover losses  

       of personnel from outside agency  

       security policy required to recover losses  

integrity   2nd   3rd  

       append-only files and  

       detecting changes to data  

       immutable files and  

       importance of  

       Kerberos and  

       kernel security levels and  

       LDAP and  

       NFS and  

       read-only filesystems and  

       Samba and  

       security checklist for  

       software for checking  

       tools for checking  

International Data Encryption Algorithm (IDEA)  

International Federation for Information Processing, Technical Committee 11  

International Information Systems Security Certification Consoritium, Inc. (ISC)2  

Internet  

       addresses   [See IP addresses]

       domain as NIS domain  

       firewalls   [See firewalls]

       history of   2nd  

       pornography and  

       programmed threats coming from  

       security and  

       security of Unix systems on  

Internet Control Message Protocol   [See ICMP]

Internet daemon   [See inetd program]2nd   [See inetd program]

Internet Group Management Protocol (IGMP)  

Internet Message Access Protocol (IMAP)  

Internet Packet Exchange (IPX)  

Internet Protocol  

Internet Relay Chat (IRC)  

Internet Security Scanner   [See ISS]

Internet servers  

       books about  

       bringing up securely  

       controlling access to  

       inetd starting  

       location of  

       restricted filesystems and  

       startup of  

       types of  

Internet Service Provider (ISP), finding information about  

Internet services   [See network services]

Internet Society  

Internet worm program  

Internetworking with TCP/IP (Comer, Douglas E.)  

intruders   2nd   [See also break-ins; hackers]

       authors of programmed threats  

       case studies of  

       contacting   2nd  

       discovering  

       getting rid of  

       monitoring  

       recovering from damage by  

       tracing connection of  

       tracking through log files  

Intrusion Detection (Bace, Rebecca)  

intrusion detection system (IDS)  

investigations of employees  

ioctl() system call  

IP addresses  

       controlling access by  

       determining from hostnames  

       finding information about  

       monitoring for security  

        name service and  

IP networks   2nd   [See also TCP/IP networks]

       alternatives to  

       attacks on   2nd  

       authentication for, improving  

       decoy systems for  

       encryption and  

       firewalls for  

       hardening against attacks  

       physical isolation of  

IP packets   2nd  

       eavesdropping  

       monitoring  

       sniffing   2nd  

IP protocols  

IP spoofing   2nd   3rd  

ipchains program   2nd  

ipf program  

ipfilter program  

ipfirewall program  

ipfw program   2nd   3rd  

IPsec  

iptables program   2nd  

IPv4 (IP Version 4)  

IPv6 (IP Version 6)  

IPX (Internet Packet Exchange)  

IRC (Internet Relay Chat)  

ISO 9660 filesystem  

ISP (Internet Service Provider), finding information about  

ISS (Internet Security Scanner)   2nd  

ISSA (Information Systems Security Association)  

Категории