Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: D
- DAC (Discretionary Access Controls)
: 4.1.3. Groups and Group Identifiers (GIDs)
- daemon (user)
: 4.1. Users and Groups
- damage, liability for
: 26.4.6. Liability for Damage
- DARPA
: (see ARPA)
- DAT (Digital Audio Tape)
: 7.1.4. Guarding Against Media Failure
- data
- assigning owners to
: 2.4.4.1. Assign an owner
- availability of
: 2.1. Planning Your Security Needs
- communication equipment (DCE)
: 14.3. The RS-232 Serial Protocol
- confidential
- 2.1. Planning Your Security Needs
- 2.5.2. Confidential Information
- disclosure of
: 11.2. Damage
- giving away with NIS
: 19.4.5. Unintended Disclosure of Site Information with NIS
- identifying assets
: 2.2.1.1. Identifying assets
- integrity of
: (see integrity, data)
- spoofing
: 16.3. IP Security
- terminal equipment (DTE)
: 14.3. The RS-232 Serial Protocol
- Data Carrier Detect (DCD)
: 14.3. The RS-232 Serial Protocol
- Data Defense Network (DDN)
: F.3.4.20. MILNET
- Data Encryption Standard
: (see DES)
- Data Set Ready (DSR)
: 14.3. The RS-232 Serial Protocol
- Data Terminal Ready (DTR)
: 14.3. The RS-232 Serial Protocol
- database files
: 1.2. What Is an Operating System?
- databases
: (see network databases)
- date command
- 8.1.3. Accounts That Run a Single Command
- 24.5.1. Never Trust Anything Except Hardcopy
- day-zero backups
: 7.1.3. Types of Backups
- dbx debugger
: C.4. The kill Command
- DCE (data communication equipment)
: 14.3. The RS-232 Serial Protocol
- DCE (Distributed Computing Environment)
- 3.2.2. The /etc/passwd File and Network Databases
- 8.7.3. Code Books
- 16.2.6.2. Other naming services
- 19.2. Sun's Remote Procedure Call (RPC)
- 19.7.1. DCE
- dd command
- 6.6.1.2. Ways of improving the security of crypt
- 7.4.1. Simple Local Copies
- DDN (Data Defense Network)
: F.3.4.20. MILNET
- deadlock
: 23.2. Tips on Avoiding Security-related Bugs
- debug command
: 17.3.4.2. Using sendmail to receive email
- debugfs command
: 25.2.2.8. Tree-structure attacks
- DEC (Digital Equipment Corporation)
: F.3.4.9. Digital Equipment Corporation and customers
- DECnet protocol
: 16.4.3. DECnet
- decode aliases
: 17.3.4.2. Using sendmail to receive email
- decryption
: (see encryption)
- defamation
: 26.4.7. Harassment, Threatening Communication, and Defamation
- default
- accounts
: 8.1.2. Default Accounts
- deny
: 21.1.1. Default Permit vs. Default Deny
- domain
: 16.2.3. Hostnames
- permit
: 21.1.1. Default Permit vs. Default Deny
- defense in depth
: (see multilevel security)
- DELETE key
: 3.4. Changing Your Password
- deleting
- destructive attack via
: 25.1. Destructive Attacks
- files
: 5.4. Using Directory Permissions
- demo accounts
: 8.1.2. Default Accounts
- denial-of-service attacks
- 1.5. Role of This Book
- 25. Denial of Service Attacks and Solutions
- 25.3.4. Clogging
- accidental
: 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- automatic lockout
: 3.3. Entering Your Password
- checklist for
: A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
- inodes
: 25.2.2.3. Inode problems
- internal inetd services
: 17.1.3. The /etc/inetd Program
- on networks
- 25.3. Network Denial of Service Attacks
- 25.3.4. Clogging
- via syslog
: 10.5.1. The syslog.conf Configuration File
- X Window System
: 17.3.21.5. Denial of service attacks under X
- departure of employees
: 13.2.6. Departure
- depository directories, FTP
: 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
- DES (Data Encryption Standard)
- 6.4.1. Summary of Private Key Systems
- 6.4.4. DES
- 6.4.5.2. Triple DES
- 8.6.1. The crypt() Algorithm
- authentication (NIS+)
: 19.5.4. Using NIS+
- improving security of
- 6.4.5. Improving the Security of DES
- 6.4.5.2. Triple DES
- des program
- 6.4.4. DES
- 6.6.2. des: The Data Encryption Standard
- 7.4.4. Encrypting Your Backups
- destroying media
: 12.3.2.3. Sanitize your media before disposal
- destructive attacks
: 25.1. Destructive Attacks
- detached signatures
: 6.6.3.6. PGP detached signatures
- detectors
- cable tampering
: 12.3.1.1. Wiretapping
- carbon-monoxide
: 12.2.1.2. Smoke
- humidity
: 12.2.1.11. Humidity
- logging alarm systems
: 10.7.1.1. Exception and activity reports
- smoke
: 12.2.1.2. Smoke
- temperature alarms
: 12.2.1.6. Temperature extremes
- water sensors
: 12.2.1.12. Water
- Deutsches Forschungsnetz
: F.3.4.14. Germany: DFN-WiNet Internet sites
- /dev directory
: 14.5.1. Hooking Up a Modem to Your Computer
- /dev/audio device
: 23.8. Picking a Random Seed
- /dev/console device
: 5.6. Device Files
- /dev/kmem device
- 5.6. Device Files
- 11.1.2. Back Doors and Trap Doors
- /dev/null device
: 5.6. Device Files
- /dev/random device
: 23.7.4. Other random number generators
- /dev/swap device
: 5.5.1. SUID, SGID, and Sticky Bits
- /dev/urandom device
: 23.7.4. Other random number generators
- device files
: 5.6. Device Files
- devices
- managing with SNMP
: 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports 161 and 162)
- modem control
: 14.5.2. Setting Up the UNIX Device
- Devices file
: 14.5.1. Hooking Up a Modem to Your Computer
- df -i command
: 25.2.2.3. Inode problems
- dictionary attack
: 8.6.1. The crypt() Algorithm
- Diffie-Hellman key exchange system
- 6.4.2. Summary of Public Key Systems
- 18.6. Dependence on Third Parties
- 19.3. Secure RPC (AUTH_DES)
- breaking key
: 19.3.4. Limitations of Secure RPC
- exponential key exchange
: 19.3.1. Secure RPC Authentication
- Digital Audio Tape (DAT)
: 7.1.4. Guarding Against Media Failure
- digital computers
: 6.1.2. Cryptography and Digital Computers
- Digital Equipment Corporation (DEC)
: F.3.4.9. Digital Equipment Corporation and customers
- Digital Signature Algorithm
: (see DSA)
- digital signatures
- 6.4. Common Cryptographic Algorithms
- 6.5. Message Digests and Digital Signatures
- 6.5.5.2. Message authentication codes
- 9.2.3. Checksums and Signatures
- checksums
: 6.5.5.1. Checksums
- detached signatures
: 6.6.3.6. PGP detached signatures
- with PGP
: 6.6.3.4. Adding a digital signature to an announcement
- Digital UNIX
- 1.3. History of UNIX
- (see also Ultrix)
- directories
- 5.1.1. Directories
- 5.1.3. Current Directory and Paths
- ancestor
: 9.2.2.2. Ancestor directories
- backing up by
: 7.1.3. Types of Backups
- CDFs (context-dependent files)
: 24.4.1.7. Hidden files and directories
- checklist for
: A.1.1.4. Chapter 5: The UNIX Filesystem
- dot, dot-dot, and /
: 5.1.1. Directories
- FTP depositories
: 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
- immutable
: 9.1.1. Immutable and Append-Only Files
- listing automatically (Web)
: 18.2.2.2. Additional configuration issues
- mounted
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mounting secure
: 19.3.2.5. Mounting a secure filesystem
- nested
: 25.2.2.8. Tree-structure attacks
- NFS
: (see NFS)
- permissions
: 5.4. Using Directory Permissions
- read-only
: 9.1.2. Read-only Filesystems
- restricted
- 8.1.5. Restricted Filesystem
- 8.1.5.2. Checking new software
- root
: (see root directory)
- SGI and sticky bits on
: 5.5.6. SGID and Sticky Bits on Directories
- Web server structure of
- 18.2.2. Understand Your Server's Directory Structure
- 18.2.2.2. Additional configuration issues
- world-writable
: 11.6.1.1. World-writable user files and directories
- <Directory> blocks
- 18.3.1. The access.conf and .htaccess Files
- 18.3.2. Commands Within the <Directory> Block
- 18.3.2.1. Examples
- disaster recovery
: 12.2.6.4. Minimizing downtime
- disk attacks
- 25.2.2. Disk Attacks
- 25.2.2.8. Tree-structure attacks
- disk quotas
: 25.2.2.5. Using quotas
- diskettes
: (see backups; media)
- dismissed employees
: 13.2.6. Departure
- disposing of materials
: 12.3.3. Other Media
- Distributed Computing Environment
: (see DCE)
- DNS (Domain Name System)
- 16.2.6. Name Service
- 16.2.6.2. Other naming services
- 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- 17.3.6.2. DNS nameserver attacks
- nameserver attacks
: 17.3.6.2. DNS nameserver attacks
- rogue servers
: 16.3.2. Security and Nameservice
- security and
: 16.3.2. Security and Nameservice
- zone transfers
- 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- 17.3.6.1. DNS zone transfers
- documentation
- 2.5. The Problem with Security Through Obscurity
- 23.2. Tips on Avoiding Security-related Bugs
- domain name
: 16.2.3. Hostnames
- Domain Name System
: (see DNS)
- domainname command
: 19.4.3. NIS Domains
- domains
: 19.4.3. NIS Domains
- dormant accounts
- 8.4. Managing Dormant Accounts
- 8.4.3. Finding Dormant Accounts
- dot (.) directory
: 5.1.1. Directories
- dot-dot (..) directory
: 5.1.1. Directories
- Double DES
: 6.4.5. Improving the Security of DES
- double reverse lookup
: 16.3.2. Security and Nameservice
- DOW USA
: F.3.4.10. DOW USA
- downloading files
: 12.3.4. Protecting Local Storage
- logging
- 10.3.3. xferlog Log File
- 10.3.5. access_log Log File
- downtime
: 12.2.6.4. Minimizing downtime
- due to criminal investigations
: 26.2.4. Hazards of Criminal Prosecution
- logging
: 10.7.2.1. Exception and activity reports
- drand48 function
: 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- drills, security
: 24.1.3. Rule #3: PLAN AHEAD
- drink
: 12.2.2.1. Food and drink
- DSA (Digital Signature Algorithm)
- 6.4.2. Summary of Public Key Systems
- 6.5.3. Digital Signatures
- DTE (data terminal equipment)
: 14.3. The RS-232 Serial Protocol
- du command
: 25.2.2.1. Disk-full attacks
- dual universes
: 5.9.1. Dual Universes
- ducts, air
: 12.2.3.2. Entrance through air ducts
- dump/restore program
- 7.1.3. Types of Backups
- 7.4.3. Specialized Backup Programs
- 7.4.4. Encrypting Your Backups
- dumpster diving
: 12.3.3. Other Media
- duress code
: 8.7.2. Token Cards
- dust
: 12.2.1.3. Dust
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|