Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

P1003.1e/2c security standards  

pacct file  

package-based software management systems   2nd  

       backing out of upgrades  

       upgrading with  

packet monitors  

packet sniffing   2nd  

packet-filtering firewalls  

packet-level firewalls  

packet-switching networks  

paging  

PAM (Pluggable Authentication Modules)  

       npasswd module  

       one-time password module  

       resource limits  

       restricting logins with  

       restrictions used with Samba  

       S/Key module  

       using LDAP with  

       using with Kerberos  

pam.conf file   2nd  

pam_ldap  

pam_time module  

paper   [See media, printed]

parent processes  

parentheses (()), indicating system call  

parity bit  

passive FTP  

passwd command   2nd  

       -l option  

       -n option  

       -x option  

       changing permissions for  

       -f flag  

       preventing bad password choices  

       as SUID program  

       using as superuser  

passwd file   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

Passwd table (NIS+)  

passwd+ package   2nd  

passwd.adjunct file  

password modems  

passwords

       accounts without  

       advisors for  

       aging  

       assigning to users  

       authentication with  

       bad choices for   2nd  

       changing  

               another user 's  

               to disable accounts  

        characters allowed in  

       choosing   2nd   3rd   4th  

       codebooks for  

       compromised  

       constraining choices for  

       control characters in   2nd  

       cracking   2nd   3rd   4th  

       encryption of   2nd   3rd   4th   5th  

       entering  

       expiring  

       file stored in  

       FTP and  

       generators for  

       good choices for  

        group  

       guessing attacks  

       hit lists of  

       identical to username (Joes)   2nd  

       for Instant Messaging  

       keeping secure   2nd   3rd  

       Kerberos  

       keystroke recorder capturing  

       location of  

       locking account if incorrect  

       logging changes to  

       logging failed attempts at  

       master file  

       for MUDs  

       on multiple machines  

       over network connections  

       NIS+, changing  

       NIS, with Secure RPC  

       one-time   2nd   3rd  

       periodic scanning of  

       with POP  

       preventing users from changing  

       programmed to function keys  

       public key authentication as alternative to  

       security checklist for  

       shadow   2nd   3rd  

       shoulder surfing  

       sniffing   2nd   3rd   4th   5th  

       spaces in  

       ssh keys used for  

       synchronized on multiple accounts  

       system clock and  

       token-based generator for  

       unique, number of  

       using in programs  

       verifying new  

       wizard's (sendmail)  

       writing down  

patch diff  

patch program  

patches

       finding  

       installing  

       logging  

PATH variable   2nd  

PATHCONF function (RPC)  

pathname  

The Pathology of Computer Viruses (Ferbrache, David)  

paths

       pathname for  

       trusted  

pax program  

PDP-11 processors  

peer review, verifying cryptographic algorithms with  

Pengo  

per-machine log books  

per-site log books  

percent sign (%), Unix C shell prompt  

performance reviews  

performance, overload attacks affecting  

peripheral devices   [See device files]

Perl  

       random seed generator  

       Trojan horses in scripts  

       using for SUID/SGID programs  

       using instead of shell scripts  

Perlman, Radia (Network Security: Private Communications in a Public World)  

permissions  

       changing  

       devices  

       directories   2nd  

       /etc/utmp file  

       execute   2nd   3rd  

       files  

       modem devices  

       modem files  

       modified by intruders  

       nameserver files  

       of NIS+ objects   2nd  

       octal  

       of commands  

       read   2nd   3rd  

       setting  

       sticky bit  

       stored in inodes  

       SUID and SGID   2nd  

       symbolic links and  

       umasks  

       write   2nd   3rd  

personnel   [See employees ]

pf program  

Pfleeger, Charles P. (Security in Computing)  

PGP (Pretty Good Privacy)  

       for backups  

       for email  

       software signature  

PGP: Pretty Good Privacy (Garfinkel, Simson)  

ph program  

phantom mail  

Phoenix, Tom (Learning Perl)  

phones   [See telephones]

physical security

       access to hardware   2nd  

       accidents  

       acts of war and terrorism  

       of backups  

       checklist for  

       costs of  

       environmental dangers  

       hardware, protection for  

       importance of  

       IP network computers  

       modems   2nd  

       planning  

       read-only filesystems  

       real-world example  

       security perimeter for  

       signal- grounding attacks  

       telephone lines  

       theft of hardware  

       vandalism  

PIDs (process IDs)   2nd  

Pike, Rob (The UNIX Programming Environment)  

ping of death attacks   2nd  

piracy, software  

pkg (package) system  

pkg_add command  

pkg_delete command  

pkg_info command   2nd  

pkgadd command  

pkginfo command  

pkgrm command  

PKI (Public Key Infrastructure)   2nd  

pkill command  

plaintext attacks   2nd   3rd  

.plan file  

platforms   [See specific operating systems]

play account  

playback attacks  

Pluggable Authentication Modules   [See PAM]

plus sign (+)

       in file permissions  

       in hosts .equiv file  

       in NIS   2nd  

Point-to-Point Protocol   [See PPP]

policy, security   2nd  

       best practices used for  

       checklist for  

       compliance audits for  

       cost-benefit analysis  

       guidelines in  

       positive statements in  

       risk assessment   2nd  

       role of   2nd  

       simplified in four steps  

       standards in  

       writing  

political activists

       as authors of programmed threats  

       planting programmed threats  

Pollard, J. M. ("The Number Field Sieve")  

polygraph tests, of employees  

POP (Post Office Protocol)  

pop3 service  

popen() system call   2nd  

POPS (secure POP)  

pornography laws  

port scanners  

portable I/O library  

portmap daemon  

portmapper program   2nd   3rd  

        bugs in  

       firewalls and  

       proxy forwarding enabled by  

       spoofing RPC with  

portmon variable  

ports  

       for network services  

       trusted  

       well-known  

ports collection, source-based management systems in  

portsentry program  

POSIX

       and chown command  

       orphaned process groups  

       saved user ID  

       standards   2nd   3rd  

Post Office Protocol   [See POP]

postfix program   2nd   3rd  

postmaster account  

PostScript files

       Trojan horses in  

       viruses in  

power

       outages, logging  

       shutting off, as destructive attack  

       surges  

power users  

Power, Richard (Tangled Web)  

PPP (Point-to-Point Protocol)   2nd  

preserve program, security hole in  

Press Enter (Varley, John)  

Pretty Good Privacy   [See PGP]

primary group  

principals, NIS+  

print through process  

printed media   [See media, printed]

printer service  

printers

       /etc/hosts.lpd file  

       logging to  

       lp user for  

       output, security of  

priority of process  

privacy   [See confidentiality]

private key algorithms   [See symmetric key algorithms]

private keys   [See secret keys]2nd  

privilege testing, modems  

privileges, file   [See permissions]2nd   [See permissions]

privileges, SUID   [See SUID programs]

/proc filesystem  

process accounting  

process group IDs  

process IDs   [See PIDs]

processes  

       commands to control  

       controlling  

        core file of  

       creating  

        defunct  

       examining   2nd  

       group IDs for  

       listing with ps command  

       listing with top command  

       niceness of  

       overload attacks  

       priority of  

       programs running in  

       properties of  

       scheduler  

       session IDs for  

       signals and  

       slave ( zombies or Trojans)  

       soft process limits  

       stopping  

       superuser control of  

       tree for  

       Unix startup and login  

procmail system  

.procmailrc file  

.profile file  

profile file  

.profile file  

profile file  

ProFTPD server  

programmed threats

       authors of  

       to automatic mechanisms  

       back doors   2nd   3rd  

       bacteria  

       damage done by  

       entry into computer system  

       logic bombs   2nd  

       protection from  

       published resources on  

       rabbit programs  

       security checklist for  

       security tools  

       to shells  

       to startup files  

       Trojan horses   2nd   3rd  

       types of  

       viruses   2nd   3rd  

       worms  

programming

       coding standards for  

       design principles for   2nd  

       network services  

       published resources on  

       security checklist for  

       SUID/SGID programs  

       syslog calls in  

       threads and  

Programming Perl (Wall, Larry; Christiansen, Tom; Orwant, Jon)  

programs   [See software]2nd   [See software]

Project Athena   2nd   [See also Kerberos system]

.project file  

prompts, symbols for  

protocols   [See specific protocols]

Protocols table (NIS+)  

proxy, using in network services  

ps command   2nd   3rd   4th   5th  

       with kill command  

       to stop process overload  

pseudo-devices  

pseudorandom functions  

pstree command  

public key algorithms   2nd  

       applications of  

       attacks on  

       authentication and   2nd  

       backups and  

       computational expense of  

       digital signatures created with  

       key length and  

       known versus published methods of  

       types of  

Public Key Infrastructure   [See PKI]

Public Key Partners  

public keys   2nd   3rd   4th   5th  

publications , security  

publicity, as motivation for programmed threats  

publickey file  

PureFTPd server  

PurifyPlus (Rational)  

pwck command  

pwdadm program  

Категории