Index A


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

absolute pathnames  
Absolute Software Corporation  
abuse account  
access
        open  
       physical, to hardware   2nd  
access control  
       access control lists   [See ACL]
       file permissions   [See permissions]
       Internet servers  
       NIS+ objects   2nd  
       physical access to computers   [See physical security]
       restricted filesystems  
       X Window System  
access devices  
ACCESS function (RPC)  
access() system call  
access_log file  
accidents   [See environmental dangers]
accounting, process  
accounts  
       aliases for  
       changing login shell   2nd  
       changing password  
       created by intruders  
       default  
       demo  
        dormant  
       expiring  
        group  
       historical  
       importing to NIS server   2nd   3rd  
       Joes   2nd  
       locking automatically  
       logging changes to  
        names commonly attacked  
       names for   [See usernames]
       open   2nd  
       restricted, with rsh  
       root, protecting  
       running single command  
       security checklist for  
       synchronized passwords on  
       viewing in network database  
       without passwords  
acct file   2nd   3rd  
acctcom program  
accton command  
ACK bit  
ACL (Access Control List)  
       indicated by + in file permission  
       NNTP with  
       part of Unix security standard  
ACM (Association for Computing Machinery)   2nd  
active FTP  
activists
       as authors of programmed threats  
       planting programmed threats  
aculog file   2nd  
adb
       command  
       debugger  
add-on functionality  
addresses
       CIDR  
       Internet   [See IP addresses]
Adleman, Leonard M.  
       "A Method for Obtaining Digital Signatures"  
admintool command  
Advanced Encryption Standard (AES)  
Advanced Research Projects Agency (ARPA)  
air ducts, access through  
AIX
       file for new shells  
       history of  
       preventing users from changing passwords  
       silent ignore.* in syslog.conf  
       trusted path  
alarms   [See detectors]
Albitz, Paul (DNS and BIND)  
algorithmic attacks on encryption  
aliases
       account  
       decode  
       email   2nd  
               back door using  
       file for   2nd   3rd   4th  
       phantom email, avoiding with  
All Tomorrow's Parties (Gibson, William)  
Allman, Eric  
allow-transfers directive  
Amanda backup system   2nd   3rd  
amanda user  
Amateur Action Bulletin Board System  
American Civil Liberties Union v. Reno  
American Society for Industrial Security (ASIS)  
Amoroso, Edward (Fundamentals of Computer Security Technology)  
analog program  
analytic attacks on encryption  
ancestor directories, detecting changes to  
Anderson, Ross (Security Engineering)  
ANI (Automatic Number Identification)   2nd  
anlpasswd package  
anonymous FTP   2nd   3rd  
ANSI
       C compiler  
       C standards  
answer mode  
answer testing, modems  
answerback terminal mode, Trojan horses and  
Apache web servers
       always running  
       buffer overflows in  
       crypt() needed to verify passwords  
       logging from  
        requests increasing forked processes  
       security problems with  
       SSL library for  
       Tripwire for  
APOP option (POP)  
append-only files  
AppleTalk protocol  
application-level encryption  
Applied Cryptography: Protocols, Algorithms, and Source Code in C (Schneier, Bruce)  
ar program   2nd  
archiving information   2nd   [See also backups ]3rd  
arguments, checking  
arp command  
ARP table, printing contents of  
ARPA (Advanced Research Projects Agency)  
ARPANET network  
arpwatch program  
ASIS (American Society for Industrial Security)  
assert macro  
assessing risks   2nd  
assets
       identifying  
       identifying threats to  
       physical  
Association for Computing Machinery   [See ACM]
asymmetric key algorithms   2nd   [See also public key algorithms]
Asynchronous Transfer Mode (ATM)  
@ Large (Freedman, David H. and Mann, Charles C.)  
at program   2nd  
at sign (@), in xhost list  
AT&T System V   [See System V Unix]
Athena, Project   2nd   [See also Kerberos system]
atime   2nd  
Atkins, Derek  
Atkins, E. Todd   2nd  
ATM (Asynchronous Transfer Mode)  
attackers , computer   [See intruders]
audio device  
audit IDs   2nd  
audit trail   2nd   [See also log files]
auditing   2nd   [See also logging]3rd  
       C2 audit  
       compliance audit  
       security checklist for  
       transaction audit  
       user access to equipment  
auth service   2nd  
AUTH_DES authentication   2nd   3rd  
AUTH_KERB authentication  
AUTH_NONE authentication  
AUTH_UNIX authentication   2nd   3rd  
authd service  
authdes_win variable  
authentication  
       email and  
       ident, for TCP/IP  
       IP services  
       Kerberos  
       LDAP  
       of logins  
       message digests  
       Netnews messages  
       for network systems   [See network authentication systems]
       PAM  
       public key   2nd   3rd  
       RPC  
       Samba   2nd  
       Secure RPC  
       security checklist for   2nd  
       SMB  
       SSH client  
       SSH host  
       standards for  
       xhost facility  
authenticators   2nd   [See also passwords]
Authenticode  
authorization   [See authentication]
authwarnings option, sendmail  
Auto_Mounter table (NIS+)  
autologout shell variable  
Automatic Number Identification   [See ANI]
automatic systems
       abuse of  
       for backups  
availability of services  
awareness, security   [See security, user awareness of]
awk scripts, Trojan horses in  



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net