Critical Incident Management

 < Day Day Up > 


U

UDP, see User Datagram Protocol

Unicode input attack, 198

Uniform Domain Name Dispute Resolution Policy, 349, 350

United States v. Slanina, 396

UNIX, 136

auditing, 163

boot disk for, 246

crypt program, 471

dd command, 270, 281, 285

file system, 279, 280

hardware inventory, 164

logging, 240

shadow password file, 166

sum program, 472

UNIX-based investigations, 307

baseline comparison for SUID/SGID files, 314

coroner's toolkit, 309

data hiding techniques, 309

file recovery alternatives, 312

file stamps, 312

file system analysis, 307

hiding files, 310

log files, 314

steganography, 311

strong encrypted protections, 312

system configuration, 314

undeleting UNIX, 208

understanding file permissions, 312

user and password accounts, 314

Unlawful acts, types of, 343

URL, 227

U.S. copyright laws, 61

U.S. Department of Justice, 366

USENET newsgroups, 488, 496

User(s)

acceptance testing, 192

Datagram Protocol (UDP), 181

dial-in, 474

identification, 139

passwords

changing, 298

cracking, 299

security training, 243

U.S. government

employees, 29

publications, 134

U.S. Patent and Trademark Office, 346, 348

Utility(ies)

failures, 76

patents, 351


 < Day Day Up > 

Категории