[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
DAC (Discretionary Access Controls)
Daemen, Joan
daemon user
daemons
Dalheimer, Mattias K. (Running Linux)
Dalton, Chris I.
DARPA
[See ARPA] data
[See also data protection; information] backing up
[See backups] confidentiality of
[See confidentiality] encryption of
[See encryption] integrity of
[See integrity] data bits
Data Carrier Detect (DCD)
data communication equipment (DCE)
Data Encryption Algorithm (DEA)
Data Encryption Standard
[See DES] data protection
2nd
[See also backups] eavesdropping
local storage
real-world example
sanitizing media before disposal
theft, from
unattended terminals
Data Set Ready (DSR)
data spoofing
data terminal equipment (DTE)
Data Terminal Ready (DTR)
databases
[See also network authentication systems] network
system
date account
Dawson, Terry (Running Linux)
day-zero backup
[See level-zero backup] daytime service
2nd
dbx debugger
DCD (Data Carrier Detect)
DCE (data communication equipment)
DCE (Distributed Computing Environment)
2nd
3rd
4th
5th
6th
dd command
2nd
DDoS (Distributed Denial of Service) attacks
DEA (Data Encryption Algorithm)
deadlock
DEBUG command, SMTP
debugfs command
2nd
3rd
DECnet
decode aliases
decoy systems
decryption
default accounts
default domain
defense in depth
[See multilevel security]2nd
[See multilevel security] demo accounts
denial of service attacks
2nd
accidental
automatic account lockout
causes of
destructive
2nd
distributed (DDoS)
internal inetd services
logging to /dev/console causing
on networks
overload
2nd
security checklist for
syslog causing
types of
Denning, Dorothy E. R. (Cryptography and Data Security)
Denning, Peter J. (Computers Under Attack: Intruders, Worms, and Viruses)
Department of Justic (DOJ)
deployment environments
depository directories, FTP
DES (Data Encryption Standard)
2nd
example of
Kerberos using
key length of
NIS+
weakness of
des command
2nd
DES Extended format
The Design and Implementation of the 4.4 BSD UNIX Operating System (McKusick, Marshall Kirk; Bostic,
The Design of the UNIX Operating System (Bach, Maurice)
destroying media
destructive denial of service attacks
2nd
detectors cable tampering
carbon monoxide
fire alarms
humidity
logging alarm systems
motion
placement and monitoring of
smoke
temperature alarms
water sensors
/dev directory /dev/audio device
/dev/console device
/dev/kmem device
2nd
/dev/null device
/dev/random device
/dev/swap device
/dev/urandom device
device files
devices access, legal definition of
back door in
backup, world-readable
configuring on local area network
logging information about
managing with SNMP
modem control
random number sources
superuser control of
Devices file
df -i command
dfstab file
2nd
dfstab script
DHCP protocol
dictionary attack
diff program
differential backup
differential cryptanalysis
differential fault analysis
differential power analysis
differential timing analysis
Diffie, Whitfield
2nd
"New Directions in Cryptography"
"The First Ten Years of Public-Key Cryptography"
Diffie-Hellman exponential key exchange system
2nd
3rd
4th
5th
6th
Digital Millennium Copyright Act (DMCA)
Digital Signature Algorithm (DSA)
Digital Signature Standard (DSS)
2nd
digital signatures
2nd
[See also signatures, data] distributed with software
DSA (Digital Signature Algorithm)
DSS (Digital Signature Standard)
2nd
HMAC as alternative to
message digest algorithms used for
2nd
public key cryptography used with
2nd
RSA as basis for
directories
2nd
3rd
[See also files] ancestor, detecting changes to
CDFs (context-dependent files)
current
FTP depositories
home
security of
links to
mounted
nested, tree structure attacks on
NFS
[See NFS] permissions for
2nd
SGID and sticky bits on
world-writable
directory services
[See Kerberos system LDAP NIS NIS+] dired mode, GNU Emacs
Disappearing Cryptography (Wayner, Peter)
disaster planning
2nd
Disaster Recovery Journal
discard service
2nd
Discretionary Access Controls (DAC)
disk drives
[See also media] destructive attacks to
difficulty of sanitizing
filling up, as overload attack
Firewire-based
hidden space on
logging information about
partitioning
partitions, backups by
quotas for
reserved space on
write-protect switches for
2nd
Distributed Computing Environment
[See DCE]2nd
[See DCE] Distributed Denial of Service (DDoS) attacks
DMCA (Digital Millennium Copyright Act)
DNS (Domain Name System)
2nd
attacks on
client flooding
dynamic
nameserver attacks
nameserver cache poisoning
Public Key Infrastructure (PKI)
rogue servers
security and
2nd
security precautions for
zone transfers
2nd
DNS and BIND (Albitz, Paul and Liu, Cricket)
DNSSEC
Dobbertin, Hans
documentation of break-in
log books
log files, hardcopy of
2nd
manuals
2nd
software
DOJ (Department of Justice)
dollar sign ($), as Unix Bourne or Korn shell prompt
domain name
2nd
Domain Name System
[See DNS] domain service
2nd
domain socket
domainname command
domains (NIS)
dormant accounts
disabling automatically
disabling by changing password
finding
dot (.) directory
2nd
dot-dot (..) directory
2nd
double reverse lookup
downtime, logging
dpkg package management system
drand48() system call
Dreyfus, Suelette (Underground)
drinks, effects on hardware
DSA (Digital Signature Algorithm)
DSR (Data Set Ready)
DSS (Digital Signature Standard)
2nd
DTE (data terminal equipment)
DTR (Data Terminal Ready)
du command
due care
[See best practices] dump program
2nd
3rd
DUMP request
dumpster diving
duress code
dust, effects on hardware
DVD, mounted read-only
dynamic DNS
|
| |