U


umask value, default, 186

uninterrupted power supply (UPS), 85, 95

Unix and Linux operating systems auditing, 165-205

account management and password controls

master checklist, 203-204

test steps, 173-182

audit logs

master checklist, 205

test steps, 196-199

background, 165-166

file security and controls

master checklist, 204

test steps, 182-188

file system layout, navigation, and permissions, 167-170

knowledge base, 202-203

LDAP, NIS, or NIS+, 171-172

network security and controls

master checklist, 205

test steps, 188-195

overview, 165

security monitoring and other controls

master checklist, 205

test steps, 199-201

tools and technology, 201-202

Chkrootkit, 201-202

John Ripper and Crack, 202

Nessus, 201

NMAP, 201

overview, 201

Shell/Awk/etc, 202

users and authentication, 170-171

overview, 170

Unix Group File, 171

Unix Password File, 170

Unix Shadow File, 170-171

unmanaged devices, 277

UPS (uninterrupted power supply), 85, 95

URLScan, 210

user access, 257, 258. See also authentication

user accounts, 146-147, 173-180

user IDs, 75, 174

user rights, Windows Server, 150-151

users and authentication, 170-171

overview, 170

Unix Group File, 171

Unix Password File, 170

Unix Shadow File, 170-171

utmp file, 199



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net