Index D


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DAC (Discretionary Access Controls)  
Daemen, Joan  
daemon user  
daemons  
Dalheimer, Mattias K. (Running Linux)  
Dalton, Chris I.  
DARPA   [See ARPA]
data   [See also data protection; information]
       backing up   [See backups ]
       confidentiality of   [See confidentiality]
       encryption of   [See encryption]
       integrity of   [See integrity]
data bits  
Data Carrier Detect (DCD)  
data communication equipment (DCE)  
Data Encryption Algorithm (DEA)  
Data Encryption Standard   [See DES]
data protection   2nd   [See also backups]
       eavesdropping  
       local storage  
       real-world example  
       sanitizing media before disposal  
       theft, from  
       unattended terminals  
Data Set Ready (DSR)  
data spoofing  
data terminal equipment (DTE)  
Data Terminal Ready (DTR)  
databases   [See also network authentication systems]
       network  
       system  
date account  
Dawson, Terry (Running Linux)  
day-zero backup   [See level-zero backup]
daytime service   2nd  
dbx debugger  
DCD (Data Carrier Detect)  
DCE (data communication equipment)  
DCE (Distributed Computing Environment)   2nd   3rd   4th   5th   6th  
dd command   2nd  
DDoS (Distributed Denial of Service) attacks  
DEA (Data Encryption Algorithm)  
deadlock  
DEBUG command, SMTP  
debugfs command   2nd   3rd  
DECnet  
decode aliases  
decoy systems  
decryption  
default accounts  
default domain  
defense in depth   [See multilevel security]2nd   [See multilevel security]
demo accounts  
denial of service attacks   2nd  
       accidental  
       automatic account lockout  
       causes of  
       destructive   2nd  
       distributed (DDoS)  
       internal inetd services  
       logging to /dev/console causing  
       on networks  
       overload   2nd  
       security checklist for  
       syslog causing  
       types of  
Denning, Dorothy E. R. (Cryptography and Data Security)  
Denning, Peter J. (Computers Under Attack: Intruders, Worms, and Viruses)  
Department of Justic (DOJ)  
deployment environments  
depository directories, FTP  
DES (Data Encryption Standard)   2nd  
       example of  
       Kerberos using  
       key length of  
       NIS+  
       weakness of  
des command   2nd  
DES Extended format  
The Design and Implementation of the 4.4 BSD UNIX Operating System (McKusick, Marshall Kirk; Bostic,  
The Design of the UNIX Operating System (Bach, Maurice)  
destroying media  
destructive denial of service attacks   2nd  
detectors
       cable tampering  
       carbon monoxide  
       fire alarms  
       humidity  
       logging alarm systems  
       motion  
       placement and monitoring of  
       smoke  
       temperature alarms  
       water sensors  
/dev directory
       /dev/audio device  
       /dev/console device  
       /dev/kmem device   2nd  
       /dev/null device  
       /dev/random device  
       /dev/swap device  
       /dev/urandom device  
device files  
devices
       access, legal definition of  
       back door in  
       backup, world-readable  
       configuring on local area network  
       logging information about  
       managing with SNMP  
       modem control  
       random number sources  
       superuser control of  
Devices file  
df -i command  
dfstab file   2nd  
dfstab script  
DHCP protocol  
dictionary attack  
diff program  
differential backup  
differential cryptanalysis  
differential fault analysis  
differential power analysis  
differential timing analysis  
Diffie, Whitfield   2nd  
       "New Directions in Cryptography"  
       "The First Ten Years of Public-Key Cryptography"  
Diffie-Hellman exponential key exchange system   2nd   3rd   4th   5th   6th  
Digital Millennium Copyright Act (DMCA)  
Digital Signature Algorithm (DSA)  
Digital Signature Standard (DSS)   2nd  
digital signatures   2nd   [See also signatures, data]
       distributed with software  
       DSA (Digital Signature Algorithm)  
       DSS (Digital Signature Standard)   2nd  
       HMAC as alternative to  
       message digest algorithms used for   2nd  
       public key cryptography used with   2nd  
       RSA as basis for  
directories   2nd   3rd   [See also files]
        ancestor , detecting changes to  
       CDFs (context-dependent files)  
       current  
       FTP depositories  
       home  
               security of  
       links to  
       mounted  
       nested, tree structure attacks on  
       NFS   [See NFS]
       permissions for   2nd  
       SGID and sticky bits on  
       world-writable  
directory services   [See Kerberos system LDAP NIS NIS+]
dired mode, GNU Emacs  
Disappearing Cryptography (Wayner, Peter)  
disaster planning   2nd  
Disaster Recovery Journal  
discard service   2nd  
Discretionary Access Controls (DAC)  
disk drives   [See also media]
       destructive attacks to  
       difficulty of sanitizing  
       filling up, as overload attack  
       Firewire-based  
       hidden space on  
       logging information about  
       partitioning  
       partitions, backups by  
       quotas for  
       reserved space on  
       write-protect switches for   2nd  
Distributed Computing Environment   [See DCE]2nd   [See DCE]
Distributed Denial of Service (DDoS) attacks  
DMCA (Digital Millennium Copyright Act)  
DNS (Domain Name System)   2nd  
       attacks on  
       client flooding  
       dynamic  
       nameserver attacks  
       nameserver cache poisoning  
       Public Key Infrastructure (PKI)  
       rogue servers  
       security and   2nd  
       security precautions for  
       zone transfers   2nd  
DNS and BIND (Albitz, Paul and Liu, Cricket)  
DNSSEC  
Dobbertin, Hans  
documentation
       of break-in  
       log books  
       log files, hardcopy of   2nd  
       manuals   2nd  
       software  
DOJ (Department of Justice)  
dollar sign ($), as Unix Bourne or Korn shell prompt  
domain name   2nd  
Domain Name System   [See DNS]
domain service   2nd  
domain socket  
domainname command  
domains (NIS)  
dormant accounts  
       disabling automatically  
       disabling by changing password  
       finding  
dot (.) directory   2nd  
dot-dot (..) directory   2nd  
double reverse lookup  
downtime, logging  
dpkg package management system  
drand48() system call  
Dreyfus, Suelette (Underground)  
drinks, effects on hardware  
DSA (Digital Signature Algorithm)  
DSR (Data Set Ready)  
DSS (Digital Signature Standard)   2nd  
DTE (data terminal equipment)  
DTR (Data Terminal Ready)  
du command  
due care   [See best practices]
dump program   2nd   3rd  
DUMP request  
dumpster diving  
duress code  
dust, effects on hardware  
DVD, mounted read-only  
dynamic DNS  



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net