[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] I/O [See input/output, portable library] ICMP (Internet Control Message Protocol) 2nd 3rd Icove, David (Computer Crime: A Crimefighter's Handbook) id command IDEA (International Data Encryption Algorithm) ident daemon 2nd identd daemon Identification Protocol identifiers 2nd [See also GIDs; UIDs; usernames] Idora (Gibson, William) IDS (intrusion detection system) IEEE Computer Society IFIP Technical Committee 11 IFS variable 2nd 3rd IGMP (Internet Group Management Protocol) IM (Instant Messaging) IMAP (Internet Message Access Protocol) imap service IMAPS (secure IMAP) immutable files in.named daemon incremental backup indecency laws index nodes [See inodes] industrial spies inetd program 2nd -t (trace) option back doors in configuration changes in denial of service attacks with replacing with tcpserver program TCP Wrappers and 2nd throttle for inetd.conf file 2nd 3rd 4th 5th information as an asset availability of confidentiality of [See confidentiality] disclosed by programmed threats integrity of [See integrity] owners of Information Security Information Systems Security Association (ISSA) information warfare researchers InfoSecurity News (SC Magazine) init process init program initialization errors initialization files, system inittab file inittab program 2nd inodes change time [See ctime ] detecting changes in for device files running out of, as overload attack input/output (I/O), portable library insects , effects on hardware Insecure.org web site installation cables new Unix system software, logging Instant Messaging (IM) insurance actions against intruders required to recover losses contingency plans for break-ins and coverage for business interruption coverage for damage by law enforcement data on probability of loss 2nd filing claims with identifying coverage 2nd inventory required to recover losses from log files helping recover losses of personnel from outside agency security policy required to recover losses integrity 2nd 3rd append-only files and detecting changes to data immutable files and importance of Kerberos and kernel security levels and LDAP and NFS and read-only filesystems and Samba and security checklist for software for checking tools for checking International Data Encryption Algorithm (IDEA) International Federation for Information Processing, Technical Committee 11 International Information Systems Security Certification Consoritium, Inc. (ISC)2 Internet addresses [See IP addresses] domain as NIS domain firewalls [See firewalls] history of 2nd pornography and programmed threats coming from security and security of Unix systems on Internet Control Message Protocol [See ICMP] Internet daemon [See inetd program]2nd [See inetd program] Internet Group Management Protocol (IGMP) Internet Message Access Protocol (IMAP) Internet Packet Exchange (IPX) Internet Protocol Internet Relay Chat (IRC) Internet Security Scanner [See ISS] Internet servers books about bringing up securely controlling access to inetd starting location of restricted filesystems and startup of types of Internet Service Provider (ISP), finding information about Internet services [See network services] Internet Society Internet worm program Internetworking with TCP/IP (Comer, Douglas E.) intruders 2nd [See also break-ins; hackers] authors of programmed threats case studies of contacting 2nd discovering getting rid of monitoring recovering from damage by tracing connection of tracking through log files Intrusion Detection (Bace, Rebecca) intrusion detection system (IDS) investigations of employees ioctl() system call IP addresses controlling access by determining from hostnames finding information about monitoring for security name service and IP networks 2nd [See also TCP/IP networks] alternatives to attacks on 2nd authentication for, improving decoy systems for encryption and firewalls for hardening against attacks physical isolation of IP packets 2nd eavesdropping monitoring sniffing 2nd IP protocols IP spoofing 2nd 3rd ipchains program 2nd ipf program ipfilter program ipfirewall program ipfw program 2nd 3rd IPsec iptables program 2nd IPv4 (IP Version 4) IPv6 (IP Version 6) IPX (Internet Packet Exchange) IRC (Internet Relay Chat) ISO 9660 filesystem ISP (Internet Service Provider), finding information about ISS (Internet Security Scanner) 2nd ISSA (Information Systems Security Association) |