Index E


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

earthquakes  
Eastlake, Donald  
eavesdropping   2nd  
       IP packets   2nd  
       real-world example  
       on wireless LANs  
       wiretapping  
       X clients  
echo service   2nd   3rd  
editors
       Emacs   2nd   3rd   4th  
       ex   2nd   3rd  
       startup file attacks  
       Trojan horses in files read by  
       vi   2nd   3rd  
edquota command  
education in security   2nd   3rd  
EEI (Escrowed Encryption Initiative)  
EFF (Electronic Frontier Foundation)  
effective GIDs  
effective UIDs   2nd   3rd  
egress filters  
electrical fires  
electrical noise, effects on hardware  
electrical surges   [See power, surges]
electronic eavesdropping  
Electronic Frontier Foundation (EFF)  
Electronic Privacy Information Center (EPIC)  
elliptic curve cryptosystems  
Ellison, Carl  
Emacs editor   2nd   3rd   4th  
.emacs file  
email   2nd   [See also sendmail program]
       alias back door  
       aliases   2nd  
       authentication and  
       delivered to programs  
       encrypting  
       end- user programs for (MUAs)  
       logging  
       mail programs for (MTAs)  
       overflowing system mailboxes  
       phantom, monitoring  
       protecting queue and delivery areas  
       retrieving from server  
       security and  
       SMTP service for  
       startup file attacks  
       Trojan horses in  
       unwanted (spam)   2nd  
       viruses   2nd  
embedded edit commands  
embedded Unix systems  
embezzlers, planting programmed threats  
emergency response organizations   [See response teams ]
employees   [See also users]
       absenteeism of  
       background checks of   2nd  
       confidential information about  
       cost of losing   2nd  
        departure of  
       education in security   2nd   3rd  
       investigations of  
       irreplaceable  
       key  
       least privilege principle and  
       loss of   2nd  
       mistakes made by  
       monitoring for stress  
        notifying of security policies  
       passwords compromised by  
       performance reviews of  
        polygraph tests of  
       printed information about  
       role in security  
       security checklist for  
       security regarding  
       security threats caused by   2nd  
       separation of duties and  
       temporary  
       trusting  
encryption   [See also cryptography]2nd  
       algorithms   2nd  
               cryptographic strength of  
               public key   2nd   3rd  
               symmetric key  
       application-level  
       attacks on   [See key search attacks]
       authentication with  
       of backups   2nd   3rd  
       DCE and  
       eavesdropping, protecting from  
       of email   2nd  
       end-to-end  
       of filesystems  
       keys   2nd  
       link-level  
       loopback  
       for modems   2nd  
       of backups[encryption
               backups)  
       of passwords   2nd   3rd   4th   5th  
               Samba  
       published resources on  
       salt and  
       Secure RPC not providing  
       security checklist for  
       SSH protocol and  
       as theft precaution  
end-to-end encryption  
Engert, Kai  
enterprise networks  
environment variables
       IFS   2nd   3rd  
       not using when programming  
       PATH   2nd  
       startup attacks and  
environmental dangers   2nd  
       backups erased by  
       carbon monoxide  
       dust  
       earthquakes  
       electrical noise  
       explosions  
       fire  
       food and beverages, accidents with  
       humidity  
        insects  
       lightning   2nd  
       temperature extremes  
       vibrations  
       water  
envp  
EPIC (Electronic Privacy Informatin Center)  
equipment   [See hardware]
escape sequences, modems and  
Escrowed Encryption Initiative (EEI)  
espionage  
/etc directory
       attacker changing owner of  
       /etc/default/login file  
       /etc/exports file  
       /etc/fsck program  
       /etc/fstab file  
       /etc/ftpd   [See ftpd server]
       /etc/ftpusers file  
       /etc/ group file   2nd   3rd  
       /etc/ hosts file  
       /etc/hosts.lpd file  
       /etc/inetd   [See inetd program]
       /etc/inetd.conf file  
       /etc/init program  
       /etc/inittab file   2nd   [See also inittab program]
       /etc/keystore file  
       /etc/named.conf file  
       /etc/passwd file   2nd   3rd   4th   5th  
       /etc/profile file   2nd  
       /etc/ publickey file  
       /etc/rc directory   2nd  
       /etc/rc script  
       /etc/remote file  
       /etc/renice   [See renice command]
       /etc/secure/passwd file  
       /etc/security/passwd.adjunct file  
       /etc/services file  
       /etc/shadow file   2nd  
       /etc/ shells file  
       /etc/ttys file   2nd  
       /etc/utmp file   2nd   3rd  
       /etc/yp/makedbm program  
       making files unwritable in  
       in restricted filesystems  
ethereal program  
Ethernet, addresses for random seeds  
Ethers table (NIS+)  
EUID   [See effective UIDs]
ex editor   2nd   3rd  
exceptions  
exec command  
exec service  
exec() system call   2nd  
execl() system call  
execlp() system call  
execute permission  
       directories  
       files  
execv() system call  
execve () system call  
execvp() system call  
exim program  
explosions  
EXPN command, SMTP   2nd   3rd  
exponential key exchange system  
export controls and cryptography  
EXPORT request  
exportfs command  
exports file   2nd   3rd   4th   5th  
.exrc file  
ext2fs filesystem (Linux)   2nd   3rd  
ext3fs filesystem  
external data representation   [See XDR]
extortionists
       authoring programmed threats  
       planting programmed threats  



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net