[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] P1003.1e/2c security standards pacct file package-based software management systems 2nd backing out of upgrades upgrading with packet monitors packet sniffing 2nd packet-filtering firewalls packet-level firewalls packet-switching networks paging PAM (Pluggable Authentication Modules) npasswd module one-time password module resource limits restricting logins with restrictions used with Samba S/Key module using LDAP with using with Kerberos pam.conf file 2nd pam_ldap pam_time module paper [See media, printed] parent processes parentheses (()), indicating system call parity bit passive FTP passwd command 2nd -l option -n option -x option changing permissions for -f flag preventing bad password choices as SUID program using as superuser passwd file 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th Passwd table (NIS+) passwd+ package 2nd passwd.adjunct file password modems passwords accounts without advisors for aging assigning to users authentication with bad choices for 2nd changing another user 's to disable accounts characters allowed in choosing 2nd 3rd 4th codebooks for compromised constraining choices for control characters in 2nd cracking 2nd 3rd 4th encryption of 2nd 3rd 4th 5th entering expiring file stored in FTP and generators for good choices for group guessing attacks hit lists of identical to username (Joes) 2nd for Instant Messaging keeping secure 2nd 3rd Kerberos keystroke recorder capturing location of locking account if incorrect logging changes to logging failed attempts at master file for MUDs on multiple machines over network connections NIS+, changing NIS, with Secure RPC one-time 2nd 3rd periodic scanning of with POP preventing users from changing programmed to function keys public key authentication as alternative to security checklist for shadow 2nd 3rd shoulder surfing sniffing 2nd 3rd 4th 5th spaces in ssh keys used for synchronized on multiple accounts system clock and token-based generator for unique, number of using in programs verifying new wizard's (sendmail) writing down patch diff patch program patches finding installing logging PATH variable 2nd PATHCONF function (RPC) pathname The Pathology of Computer Viruses (Ferbrache, David) paths pathname for trusted pax program PDP-11 processors peer review, verifying cryptographic algorithms with Pengo per-machine log books per-site log books percent sign (%), Unix C shell prompt performance reviews performance, overload attacks affecting peripheral devices [See device files] Perl random seed generator Trojan horses in scripts using for SUID/SGID programs using instead of shell scripts Perlman, Radia (Network Security: Private Communications in a Public World) permissions changing devices directories 2nd /etc/utmp file execute 2nd 3rd files modem devices modem files modified by intruders nameserver files of NIS+ objects 2nd octal of commands read 2nd 3rd setting sticky bit stored in inodes SUID and SGID 2nd symbolic links and umasks write 2nd 3rd personnel [See employees ] pf program Pfleeger, Charles P. (Security in Computing) PGP (Pretty Good Privacy) for backups for email software signature PGP: Pretty Good Privacy (Garfinkel, Simson) ph program phantom mail Phoenix, Tom (Learning Perl) phones [See telephones] physical security access to hardware 2nd accidents acts of war and terrorism of backups checklist for costs of environmental dangers hardware, protection for importance of IP network computers modems 2nd planning read-only filesystems real-world example security perimeter for signal- grounding attacks telephone lines theft of hardware vandalism PIDs (process IDs) 2nd Pike, Rob (The UNIX Programming Environment) ping of death attacks 2nd piracy, software pkg (package) system pkg_add command pkg_delete command pkg_info command 2nd pkgadd command pkginfo command pkgrm command PKI (Public Key Infrastructure) 2nd pkill command plaintext attacks 2nd 3rd .plan file platforms [See specific operating systems] play account playback attacks Pluggable Authentication Modules [See PAM] plus sign (+) in file permissions in hosts .equiv file in NIS 2nd Point-to-Point Protocol [See PPP] policy, security 2nd best practices used for checklist for compliance audits for cost-benefit analysis guidelines in positive statements in risk assessment 2nd role of 2nd simplified in four steps standards in writing political activists as authors of programmed threats planting programmed threats Pollard, J. M. ("The Number Field Sieve") polygraph tests, of employees POP (Post Office Protocol) pop3 service popen() system call 2nd POPS (secure POP) pornography laws port scanners portable I/O library portmap daemon portmapper program 2nd 3rd bugs in firewalls and proxy forwarding enabled by spoofing RPC with portmon variable ports for network services trusted well-known ports collection, source-based management systems in portsentry program POSIX and chown command orphaned process groups saved user ID standards 2nd 3rd Post Office Protocol [See POP] postfix program 2nd 3rd postmaster account PostScript files Trojan horses in viruses in power outages, logging shutting off, as destructive attack surges power users Power, Richard (Tangled Web) PPP (Point-to-Point Protocol) 2nd preserve program, security hole in Press Enter (Varley, John) Pretty Good Privacy [See PGP] primary group principals, NIS+ print through process printed media [See media, printed] printer service printers /etc/hosts.lpd file logging to lp user for output, security of priority of process privacy [See confidentiality] private key algorithms [See symmetric key algorithms] private keys [See secret keys]2nd privilege testing, modems privileges, file [See permissions]2nd [See permissions] privileges, SUID [See SUID programs] /proc filesystem process accounting process group IDs process IDs [See PIDs] processes commands to control controlling core file of creating defunct examining 2nd group IDs for listing with ps command listing with top command niceness of overload attacks priority of programs running in properties of scheduler session IDs for signals and slave ( zombies or Trojans) soft process limits stopping superuser control of tree for Unix startup and login procmail system .procmailrc file .profile file profile file .profile file profile file ProFTPD server programmed threats authors of to automatic mechanisms back doors 2nd 3rd bacteria damage done by entry into computer system logic bombs 2nd protection from published resources on rabbit programs security checklist for security tools to shells to startup files Trojan horses 2nd 3rd types of viruses 2nd 3rd worms programming coding standards for design principles for 2nd network services published resources on security checklist for SUID/SGID programs syslog calls in threads and Programming Perl (Wall, Larry; Christiansen, Tom; Orwant, Jon) programs [See software]2nd [See software] Project Athena 2nd [See also Kerberos system] .project file prompts, symbols for protocols [See specific protocols] Protocols table (NIS+) proxy, using in network services ps command 2nd 3rd 4th 5th with kill command to stop process overload pseudo-devices pseudorandom functions pstree command public key algorithms 2nd applications of attacks on authentication and 2nd backups and computational expense of digital signatures created with key length and known versus published methods of types of Public Key Infrastructure [See PKI] Public Key Partners public keys 2nd 3rd 4th 5th publications , security publicity, as motivation for programmed threats publickey file PureFTPd server PurifyPlus (Rational) pwck command pwdadm program |