Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)

I l @ ve RuBoard

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

DAC (Discretionary Access Control)   2nd  

Data Encryption Standard (DES)  

data handling  

data monitoring  

data reduction   2nd  

DCE (Distributed Computing Environment)   2nd  

DECnet  

dedicated hacker  

default

       permissions  

default account  

defense in depth  

denial of access to information  

Denial of service   2nd   3rd  

DES  

desktop computers  

destroying evidence  

destroying information  

detection  

detection software   2nd   3rd   4th  

determining the cause  

device files   2nd   3rd   4th   5th   6th   7th   8th   9th  

device-based access control  

DHCP   2nd  

dial-up access   2nd   3rd  

dial-up lines  

Dial-up SLIP/PPP Servers  

digital signature   2nd  

direct-connect terminals  

directory   2nd   3rd   4th   5th  

       home  

directory permissions  

disabled account  

disaster plan   2nd   3rd  

Disclosure of information  

Discretionary Access Control (DAC)   2nd   3rd  

disgruntled employee   2nd   3rd   4th   5th  

disruption of service  

DNS (Domain Name Services)   2nd   3rd  

DNSSec.   [See See DNS]

dormant account  

DoS (Denial of Service)   2nd   3rd   4th   5th  

due care   2nd  

dumpster diving   2nd  

I l @ ve RuBoard

Категории