[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] C programming language ANSI C compiler for ANSI standards for buffer overflows, avoiding GNU C shell [See csh] C, a Reference Manual (Harbison, Samuel P. and Steele, Guy L., Jr.) C2 audit cables, network cutting, as destructive attack fiber optic routing of 2nd tampering detectors for wiretapping caching efficient use of nameserver, poisoning of 2nd call forwarding callback schemes 2nd Caller-ID (CNID) 2nd calls, system [See system calls] capabilities system, Linux car bombs , as destructive attack carbon monoxide detectors case, of usernames cat command 2nd 3rd 4th CD-ROM, mounted read-only CDA (Communications Decency Act) CDFs (context-dependent files) ceilings, dropped, access through cellular phones Cerf, Vint CERIAS (Center for Education and Research in Information Assurance and Security) web site CERT/CC (Computer Emergency Response Team Coordination Center) contact information for mailing list for change detection [See files, detecting changes to] Chapman, D. Bren (Building Internet Firewalls) character devices 2nd chargen service 2nd 3rd chattr() system call chdir() system call 2nd checklists for detecting changes checksums 2nd Cheswick, Bill (Firewalls and Internet Security) chflags() system call chfn command 2nd chgrp command child pornography child processes Children's Internet Protection Act chkey command chmod command absolute form symbolic form chosen plaintext attacks chown command Christiansen, Tom (Programming Perl) chroot jail chroot() system call with anonymous FTP 2nd 3rd jail() as alternative to using in programs chrootuid daemon chsh command CIAC web site CIDR (Classless InterDomain Routing) 2nd CIFS (Common Internet File System) [See SMB] ciphertext 2nd Class A addresses Class B addresses Class C addresses Class D addresses Class E addresses classical network addresses Classless InterDomain Routing (CIDR) 2nd cleaning personnel Clear to Send (CTS) cleartext client authentication, SSH client flooding client-side NFS security client/server model clients , NIS [See NIS] Clipper encryption chip clock, system changing for random seeds Secure RPC timestamp synchronizing clogging (SYN flood attacks) closelog() system call clri command CMW (Compartmented-Mode Workstation) environment CNID (Caller-ID) COAST (Computer Operations, Audit, and Security Technology) code breakers [See intruders] Code Breakers: The Inside Story of Bletchley Park (Hinsley, F. H. and Stripp, Alan) codebook attacks codebooks 2nd The Codebreakers (Kahn, David) CodeCenter (Centerline) collision, message digest values Combined Log Format Comer, Douglas E. (Internetworking with TCP/IP) Xinu developed by command shells [See shells ] commands [See also specific command names ] accounts running single format used in book remote execution of running simultaneously 2nd [See also multitasking] trusted computing base (TCB) of commenting out services COMMIT function (RPC) Common Criteria book Common Internet File System (CIFS) [See SMB] Common Log Format Common Object Request Broker Architecture (CORBA) Communications Decency Act (CDA) Communications of the ACM community strings (SNMP) comparison copies compartmentalization of system privileges Compartmented-Mode Workstation (CMW) environment compliance audits Compressed SLIP (CSLIP) Computer Audit Update computer crime [See legal issues] Computer Crime: A Crimefighter's Handbook (Icove, David; Seger, Karl; VonStorch, William) computer criminals [See intruders] Computer Emergency Response Team Coordination Center [See CERT/CC] computer equipment [See hardware] Computer Fraud & Security Update Computer Law & Security Report Computer Operations, Audit, and Security Technology (COAST) Computer Oracle and Password System [See COPS] Computer Related Risks (Neumann, Peter G.) computer security [See security] Computer Security (Gollmann, Dieter) Computer Security Alert Computer Security Basics (Russell, Deborah and Gangemi, G. T., Sr.) Computer Security Buyer's Guide 2nd Computer Security Handbook (Hunt, A. E.; Bosworth, S.; Hoyt, D. B.) Computer Security Institute (CSI) 2nd Computer Security Journal Computer Security: A Comprehensive Controls Checklist (Wood, Charles Cresson, et al.) Computer Systems Research Group (CSRG) computers [See hardware] Computers & Security 2nd Computers Under Attack: Intruders, Worms, and Viruses (Denning, Peter J.) Computrace tracking system Concurrent Versions System (CVS) 2nd 3rd confidentiality 2nd 3rd [See also encryption; integrity] compared with integrity compared with security through obscurity of employee information Kerberos and Samba and configuration files immutable logging nameserver networks newsyslog program paper copies of protecting security of sendmail Swatch program syslog facility connection laundering connectionless servers (NFS) connections hijacking tracing unplugging connectors, network conserver program consistency of software console device CONSOLE variable console.perms file consultants , security [See vendors , security] contact information context, for a process context-dependent files (CDFs) contingency planning [See disaster planning] contractors, security [See vendors, security] control characters conventions for in directory names in filenames in passwords 2nd in usernames conventions used in this book cookies, magic (Xauthority) Cooper, Simon (Building Internet Firewalls) copper network cables, routing of COPS (Computer Oracle and Password System) 2nd 3rd copyright comparison copies violating disabling controls for notices in source code and datafiles unlicensed software and CORBA (Common Object Request Broker Architecture) core files 2nd correctness of data and software [See consistency of software integrity] cost-benefit analysis 2nd [See also risks, assessment of] best practices as alternative to Count Zero (Gibson, William) covert channels cp command 2nd cpio program 2nd CPU overload attacks Crack program cracklib crashes, logging CRC checksums [See checksums] CREATE function (RPC) Cred table (NIS+) crimes, computer-related [See legal issues] criminal complaints, filing criminals, as authors of programmed threats [See also intruders]2nd Crocker, Steve cron daemon, system clock and cron file 2nd 3rd crontab files 2nd 3rd 4th crypt encryption program crypt() system call 2nd 3rd crypt16 algorithm cryptanalysis Cryptfs virtual filesystem CryptoCard cryptographic filesystems 2nd cryptography 2nd [See also encryption]3rd applications of export controls, and history of hybrid public/private cryptosystems message digest functions 2nd published resources on Secure RPC implementation 2nd security checklist for techniques of Cryptography and Data Security (Denning, Dorothy E. R.) Cryptography and Network Security: Principles and Practices (Stallings, William) csh (C shell) 2nd [See also shells] autologout variable history file programs using prompt for . cshrc file 2nd 3rd CSI (Computer Security Institute) 2nd CSLIP (Compressed SLIP) CSRG (Computer Systems Research Group) ctime 2nd 3rd 4th CTS (Clear to Send) cu command 2nd 3rd 4th The Cuckoo's Egg (Stoll, Cliff) current directory Curry, David CVS (Concurrent Versions System) 2nd 3rd Cyberpunk: Outlaws and Hackers on the Computer Frontier (Hafner, Katie and Markoff, John) Cyrus SASL (Simple Authentication and Security Layer) |