[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] absolute pathnames Absolute Software Corporation abuse account access open physical, to hardware 2nd access control access control lists [See ACL] file permissions [See permissions] Internet servers NIS+ objects 2nd physical access to computers [See physical security] restricted filesystems X Window System access devices ACCESS function (RPC) access() system call access_log file accidents [See environmental dangers] accounting, process accounts aliases for changing login shell 2nd changing password created by intruders default demo dormant expiring group historical importing to NIS server 2nd 3rd Joes 2nd locking automatically logging changes to names commonly attacked names for [See usernames] open 2nd restricted, with rsh root, protecting running single command security checklist for synchronized passwords on viewing in network database without passwords acct file 2nd 3rd acctcom program accton command ACK bit ACL (Access Control List) indicated by + in file permission NNTP with part of Unix security standard ACM (Association for Computing Machinery) 2nd active FTP activists as authors of programmed threats planting programmed threats aculog file 2nd adb command debugger add-on functionality addresses CIDR Internet [See IP addresses] Adleman, Leonard M. "A Method for Obtaining Digital Signatures" admintool command Advanced Encryption Standard (AES) Advanced Research Projects Agency (ARPA) air ducts, access through AIX file for new shells history of preventing users from changing passwords silent ignore.* in syslog.conf trusted path alarms [See detectors] Albitz, Paul (DNS and BIND) algorithmic attacks on encryption aliases account decode email 2nd back door using file for 2nd 3rd 4th phantom email, avoiding with All Tomorrow's Parties (Gibson, William) Allman, Eric allow-transfers directive Amanda backup system 2nd 3rd amanda user Amateur Action Bulletin Board System American Civil Liberties Union v. Reno American Society for Industrial Security (ASIS) Amoroso, Edward (Fundamentals of Computer Security Technology) analog program analytic attacks on encryption ancestor directories, detecting changes to Anderson, Ross (Security Engineering) ANI (Automatic Number Identification) 2nd anlpasswd package anonymous FTP 2nd 3rd ANSI C compiler C standards answer mode answer testing, modems answerback terminal mode, Trojan horses and Apache web servers always running buffer overflows in crypt() needed to verify passwords logging from requests increasing forked processes security problems with SSL library for Tripwire for APOP option (POP) append-only files AppleTalk protocol application-level encryption Applied Cryptography: Protocols, Algorithms, and Source Code in C (Schneier, Bruce) ar program 2nd archiving information 2nd [See also backups ]3rd arguments, checking arp command ARP table, printing contents of ARPA (Advanced Research Projects Agency) ARPANET network arpwatch program ASIS (American Society for Industrial Security) assert macro assessing risks 2nd assets identifying identifying threats to physical Association for Computing Machinery [See ACM] asymmetric key algorithms 2nd [See also public key algorithms] Asynchronous Transfer Mode (ATM) @ Large (Freedman, David H. and Mann, Charles C.) at program 2nd at sign (@), in xhost list AT&T System V [See System V Unix] Athena, Project 2nd [See also Kerberos system] atime 2nd Atkins, Derek Atkins, E. Todd 2nd ATM (Asynchronous Transfer Mode) attackers , computer [See intruders] audio device audit IDs 2nd audit trail 2nd [See also log files] auditing 2nd [See also logging]3rd C2 audit compliance audit security checklist for transaction audit user access to equipment auth service 2nd AUTH_DES authentication 2nd 3rd AUTH_KERB authentication AUTH_NONE authentication AUTH_UNIX authentication 2nd 3rd authd service authdes_win variable authentication email and ident, for TCP/IP IP services Kerberos LDAP of logins message digests Netnews messages for network systems [See network authentication systems] PAM public key 2nd 3rd RPC Samba 2nd Secure RPC security checklist for 2nd SMB SSH client SSH host standards for xhost facility authenticators 2nd [See also passwords] Authenticode authorization [See authentication] authwarnings option, sendmail Auto_Mounter table (NIS+) autologout shell variable Automatic Number Identification [See ANI] automatic systems abuse of for backups availability of services awareness, security [See security, user awareness of] awk scripts, Trojan horses in |