[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] earthquakes Eastlake, Donald eavesdropping 2nd IP packets 2nd real-world example on wireless LANs wiretapping X clients echo service 2nd 3rd editors Emacs 2nd 3rd 4th ex 2nd 3rd startup file attacks Trojan horses in files read by vi 2nd 3rd edquota command education in security 2nd 3rd EEI (Escrowed Encryption Initiative) EFF (Electronic Frontier Foundation) effective GIDs effective UIDs 2nd 3rd egress filters electrical fires electrical noise, effects on hardware electrical surges [See power, surges] electronic eavesdropping Electronic Frontier Foundation (EFF) Electronic Privacy Information Center (EPIC) elliptic curve cryptosystems Ellison, Carl Emacs editor 2nd 3rd 4th .emacs file email 2nd [See also sendmail program] alias back door aliases 2nd authentication and delivered to programs encrypting end- user programs for (MUAs) logging mail programs for (MTAs) overflowing system mailboxes phantom, monitoring protecting queue and delivery areas retrieving from server security and SMTP service for startup file attacks Trojan horses in unwanted (spam) 2nd viruses 2nd embedded edit commands embedded Unix systems embezzlers, planting programmed threats emergency response organizations [See response teams ] employees [See also users] absenteeism of background checks of 2nd confidential information about cost of losing 2nd departure of education in security 2nd 3rd investigations of irreplaceable key least privilege principle and loss of 2nd mistakes made by monitoring for stress notifying of security policies passwords compromised by performance reviews of polygraph tests of printed information about role in security security checklist for security regarding security threats caused by 2nd separation of duties and temporary trusting encryption [See also cryptography]2nd algorithms 2nd cryptographic strength of public key 2nd 3rd symmetric key application-level attacks on [See key search attacks] authentication with of backups 2nd 3rd DCE and eavesdropping, protecting from of email 2nd end-to-end of filesystems keys 2nd link-level loopback for modems 2nd of backups[encryption backups) of passwords 2nd 3rd 4th 5th Samba published resources on salt and Secure RPC not providing security checklist for SSH protocol and as theft precaution end-to-end encryption Engert, Kai enterprise networks environment variables IFS 2nd 3rd not using when programming PATH 2nd startup attacks and environmental dangers 2nd backups erased by carbon monoxide dust earthquakes electrical noise explosions fire food and beverages, accidents with humidity insects lightning 2nd temperature extremes vibrations water envp EPIC (Electronic Privacy Informatin Center) equipment [See hardware] escape sequences, modems and Escrowed Encryption Initiative (EEI) espionage /etc directory attacker changing owner of /etc/default/login file /etc/exports file /etc/fsck program /etc/fstab file /etc/ftpd [See ftpd server] /etc/ftpusers file /etc/ group file 2nd 3rd /etc/ hosts file /etc/hosts.lpd file /etc/inetd [See inetd program] /etc/inetd.conf file /etc/init program /etc/inittab file 2nd [See also inittab program] /etc/keystore file /etc/named.conf file /etc/passwd file 2nd 3rd 4th 5th /etc/profile file 2nd /etc/ publickey file /etc/rc directory 2nd /etc/rc script /etc/remote file /etc/renice [See renice command] /etc/secure/passwd file /etc/security/passwd.adjunct file /etc/services file /etc/shadow file 2nd /etc/ shells file /etc/ttys file 2nd /etc/utmp file 2nd 3rd /etc/yp/makedbm program making files unwritable in in restricted filesystems ethereal program Ethernet, addresses for random seeds Ethers table (NIS+) EUID [See effective UIDs] ex editor 2nd 3rd exceptions exec command exec service exec() system call 2nd execl() system call execlp() system call execute permission directories files execv() system call execve () system call execvp() system call exim program explosions EXPN command, SMTP 2nd 3rd exponential key exchange system export controls and cryptography EXPORT request exportfs command exports file 2nd 3rd 4th 5th .exrc file ext2fs filesystem (Linux) 2nd 3rd ext3fs filesystem external data representation [See XDR] extortionists authoring programmed threats planting programmed threats |