[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
P1003.1e/2c security standards
pacct file
package-based software management systems
2nd
backing out of upgrades
upgrading with
packet monitors
packet sniffing
2nd
packet-filtering firewalls
packet-level firewalls
packet-switching networks
paging
PAM (Pluggable Authentication Modules)
npasswd module
one-time password module
resource limits
restricting logins with
restrictions used with Samba
S/Key module
using LDAP with
using with Kerberos
pam.conf file
2nd
pam_ldap
pam_time module
paper
[See media, printed] parent processes
parentheses (()), indicating system call
parity bit
passive FTP
passwd command
2nd
-l option
-n option
-x option
changing permissions for
-f flag
preventing bad password choices
as SUID program
using as superuser
passwd file
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
Passwd table (NIS+)
passwd+ package
2nd
passwd.adjunct file
password modems
passwords accounts without
advisors for
aging
assigning to users
authentication with
bad choices for
2nd
changing
another user's
to disable accounts
characters allowed in
choosing
2nd
3rd
4th
codebooks for
compromised
constraining choices for
control characters in
2nd
cracking
2nd
3rd
4th
encryption of
2nd
3rd
4th
5th
entering
expiring
file stored in
FTP and
generators for
good choices for
group
guessing attacks
hit lists of
identical to username (Joes)
2nd
for Instant Messaging
keeping secure
2nd
3rd
Kerberos
keystroke recorder capturing
location of
locking account if incorrect
logging changes to
logging failed attempts at
master file
for MUDs
on multiple machines
over network connections
NIS+, changing
NIS, with Secure RPC
one-time
2nd
3rd
periodic scanning of
with POP
preventing users from changing
programmed to function keys
public key authentication as alternative to
security checklist for
shadow
2nd
3rd
shoulder surfing
sniffing
2nd
3rd
4th
5th
spaces in
ssh keys used for
synchronized on multiple accounts
system clock and
token-based generator for
unique, number of
using in programs
verifying new
wizard's (sendmail)
writing down
patch diff
patch program
patches finding
installing
logging
PATH variable
2nd
PATHCONF function (RPC)
pathname
The Pathology of Computer Viruses (Ferbrache, David)
paths pathname for
trusted
pax program
PDP-11 processors
peer review, verifying cryptographic algorithms with
Pengo
per-machine log books
per-site log books
percent sign (%), Unix C shell prompt
performance reviews
performance, overload attacks affecting
peripheral devices
[See device files] Perl
random seed generator
Trojan horses in scripts
using for SUID/SGID programs
using instead of shell scripts
Perlman, Radia (Network Security: Private Communications in a Public World)
permissions
changing
devices
directories
2nd
/etc/utmp file
execute
2nd
3rd
files
modem devices
modem files
modified by intruders
nameserver files
of NIS+ objects
2nd
octal
of commands
read
2nd
3rd
setting
sticky bit
stored in inodes
SUID and SGID
2nd
symbolic links and
umasks
write
2nd
3rd
personnel
[See employees] pf program
Pfleeger, Charles P. (Security in Computing)
PGP (Pretty Good Privacy)
for backups
for email
software signature
PGP: Pretty Good Privacy (Garfinkel, Simson)
ph program
phantom mail
Phoenix, Tom (Learning Perl)
phones
[See telephones] physical security access to hardware
2nd
accidents
acts of war and terrorism
of backups
checklist for
costs of
environmental dangers
hardware, protection for
importance of
IP network computers
modems
2nd
planning
read-only filesystems
real-world example
security perimeter for
signal-grounding attacks
telephone lines
theft of hardware
vandalism
PIDs (process IDs)
2nd
Pike, Rob (The UNIX Programming Environment)
ping of death attacks
2nd
piracy, software
pkg (package) system
pkg_add command
pkg_delete command
pkg_info command
2nd
pkgadd command
pkginfo command
pkgrm command
PKI (Public Key Infrastructure)
2nd
pkill command
plaintext attacks
2nd
3rd
.plan file
platforms
[See specific operating systems] play account
playback attacks
Pluggable Authentication Modules
[See PAM] plus sign (+) in file permissions
in hosts.equiv file
in NIS
2nd
Point-to-Point Protocol
[See PPP] policy, security
2nd
best practices used for
checklist for
compliance audits for
cost-benefit analysis
guidelines in
positive statements in
risk assessment
2nd
role of
2nd
simplified in four steps
standards in
writing
political activists as authors of programmed threats
planting programmed threats
Pollard, J. M. ("The Number Field Sieve")
polygraph tests, of employees
POP (Post Office Protocol)
pop3 service
popen() system call
2nd
POPS (secure POP)
pornography laws
port scanners
portable I/O library
portmap daemon
portmapper program
2nd
3rd
bugs in
firewalls and
proxy forwarding enabled by
spoofing RPC with
portmon variable
ports
for network services
trusted
well-known
ports collection, source-based management systems in
portsentry program
POSIX and chown command
orphaned process groups
saved user ID
standards
2nd
3rd
Post Office Protocol
[See POP] postfix program
2nd
3rd
postmaster account
PostScript files Trojan horses in
viruses in
power outages, logging
shutting off, as destructive attack
surges
power users
Power, Richard (Tangled Web)
PPP (Point-to-Point Protocol)
2nd
preserve program, security hole in
Press Enter (Varley, John)
Pretty Good Privacy
[See PGP] primary group
principals, NIS+
print through process
printed media
[See media, printed] printer service
printers /etc/hosts.lpd file
logging to
lp user for
output, security of
priority of process
privacy
[See confidentiality] private key algorithms
[See symmetric key algorithms] private keys
[See secret keys]2nd
privilege testing, modems
privileges, file
[See permissions]2nd
[See permissions] privileges, SUID
[See SUID programs] /proc filesystem
process accounting
process group IDs
process IDs
[See PIDs] processes
commands to control
controlling
core file of
creating
defunct
examining
2nd
group IDs for
listing with ps command
listing with top command
niceness of
overload attacks
priority of
programs running in
properties of
scheduler
session IDs for
signals and
slave (zombies or Trojans)
soft process limits
stopping
superuser control of
tree for
Unix startup and login
procmail system
.procmailrc file
.profile file
profile file
.profile file
profile file
ProFTPD server
programmed threats authors of
to automatic mechanisms
back doors
2nd
3rd
bacteria
damage done by
entry into computer system
logic bombs
2nd
protection from
published resources on
rabbit programs
security checklist for
security tools
to shells
to startup files
Trojan horses
2nd
3rd
types of
viruses
2nd
3rd
worms
programming coding standards for
design principles for
2nd
network services
published resources on
security checklist for
SUID/SGID programs
syslog calls in
threads and
Programming Perl (Wall, Larry; Christiansen, Tom; Orwant, Jon)
programs
[See software]2nd
[See software] Project Athena
2nd
[See also Kerberos system] .project file
prompts, symbols for
protocols
[See specific protocols] Protocols table (NIS+)
proxy, using in network services
ps command
2nd
3rd
4th
5th
with kill command
to stop process overload
pseudo-devices
pseudorandom functions
pstree command
public key algorithms
2nd
applications of
attacks on
authentication and
2nd
backups and
computational expense of
digital signatures created with
key length and
known versus published methods of
types of
Public Key Infrastructure
[See PKI] Public Key Partners
public keys
2nd
3rd
4th
5th
publications, security
publicity, as motivation for programmed threats
publickey file
PureFTPd server
PurifyPlus (Rational)
pwck command
pwdadm program
|
| |