Index: I
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: I
- ICA (Independent Computing Architecture): 2.5.2. Remote Graphic Interfaces for Microsoft Operating Systems
 
  - 18.3.3. Independent Computing Architecture (ICA) 
 
 
- ICMP (Internet Control Message Protocol): 2.9.3. Network Diagnostics
 
  - 4.3.3. ICMP
 
  - 22.4. ICMP and Network Diagnostics
 
  
  - echo: 22.4.1. ping
 
    - 22.4.1. ping
 
    - (see also ping)
 
  
 
  
  - packets: 22.4.3. Other ICMP Packets
 
  
  - returning error codes: 8.3.2. Returning Error Codes
 
 
- ICMP Router Discovery Protocol (IRDP): 22.2.4. Router Discovery/ICMP Router Discovery Protocol (IRDP)
 
- ICP (Internet Cache Protocol): 15.5.1. Internet Cache Protocol (ICP)
 
- ICQ: 19.2. ICQ
 
- IDEA (International Data Encryption Algorithm): C.5.1. Encryption Algorithms
 
- identd: 21.9. Auth and identd
 
- Igateway program: 9.2.1. Using Proxy-Aware Application Software for Proxying
 
- IGMP (Internet Group Management Protocol): 22.2.3. Internet Group Management Protocol (IGMP)
 
- IIOP (Internet Inter-Orb Protocol): 14.5. Common Object Request Broker Architecture (CORBA) and Internet Inter-Orb Protocol (IIOP)
 
- ImagePath registry key: 12.4.1.1. Registry keys
 
- IMAP (Internet Message Access Protocol): 2.3.1. Electronic Mail
 
  - 16.7. Internet Message Access Protocol (IMAP)
 
 
- immutable attribute (BSD 4.4-Lite): 11.5.3. Mount Filesystems as Read-Only
 
- inbound packets: 8.2.2. Be Careful of "Inbound" Versus "Outbound" Semantics
 
  
  - filtering rules for: 8.8.6. It Should Apply Rules Separately to Incoming and Outgoing Packets, on a Per-Interface Basis
 
  
  - Telnet: 8.7.2. Inbound Telnet Service
 
 
- incident response teams: 27.1.5.2. CERT-CC or other incident response teams
 
  - 27.4.4.2. CERT-CC and other incident response teams
 
  - A.5. Response Teams
 
  
  - resources for: A.2.2. info.cert.org
 
 
- incidents: 13.1. Attacks Against Internet Services
 
  
  - accidental: 1.2.3. Stupidity and Accidents
 
  
  - buffer overflow: 13.2.3. How Well Is the Protocol Implemented?
 
    - 15.4.1. JavaScript 
 
  
 
  
  - command-channel attacks: 13.1.1. Command-Channel Attacks
 
    - 13.1.10. Protecting Services
 
  
 
  
  - contacting service providers about: 27.4.4.3. Vendors and service providers
 
  
  - data-driven attacks: 13.1.2. Data-Driven Attacks
 
    - 13.1.10. Protecting Services
 
  
 
  
  - denial of service: 13.1.9. Denial of Service
 
    - 13.1.10. Protecting Services
 
    
    - ICMP and: 22.4. ICMP and Network Diagnostics
 
  
 
  
  - detecting, plan for: 27.4.1. Planning for Detection 
 
  
  - documenting system after: 27.1.6. Snapshot the System
 
    
    - planning for: 27.4.5. Planning for Snapshots
 
  
 
  
  - email viruses: 16.1.2.2. Viruses and other hostilities
 
  
  - evaluating, plan for: 27.4.2. Planning for Evaluation of the Incident
 
  
  - factoring attacks: 14.1.1. Sun RPC Authentication
 
  
  - false authentication of clients: 13.1.4. False Authentication of Clients
 
    - 13.1.10. Protecting Services
 
  
 
  
  - hijacking: 13.1.5. Hijacking
 
    - 13.1.10. Protecting Services
 
    
    - SSH protection against: 18.2.5.5. SSH session hijacking protection
 
  
 
  
  - intrusions: 1.2.1.1. Intrusion
 
  
  - IP spoofing: 4.8.3. IP Spoofing
 
  
  - man-in-the-middle forgery: 8.6.1. Risks of Filtering by Source Address
 
  
  - multiple failed logins: 26.2.4. The Good, the Bad, and the Ugly
 
  
  - notifying people of: 27.1.5. Make "Incident in Progress" Notifications
 
    - 27.4.4. Planning for Notification of People Who Need to Know
 
  
 
  
  - packet sniffing attacks: 4.8.4. Packet Interception
 
    - 13.1.6. Packet Sniffing
 
    - 13.1.10. Protecting Services
 
  
 
  
  - password attacks: 21.3.1. One-Time Password Software
 
  
  - playback attacks: 13.1.4. False Authentication of Clients
 
  
  - port scanning: 4.8.1. Port Scanning
 
  
  - practicing drills for: 27.5.7. Doing Drills
 
  
  - recovering from: 27.1.7. Restore and Recover
 
    
    - planning for: 27.4.6. Planning for Restoration and Recovery
 
  
 
  
  - replay attacks: 13.1.8. Replay
 
    - 13.1.10. Protecting Services
 
  
 
  
  - responding to: 26.2.6. Responding to Attacks
 
    - 27. Responding to Security Incidents
 
  
 
  
  - reviewing, strategies for: 27.4.8. Periodic Review of Plans
 
  
  - social manipulation: 2.3.1. Electronic Mail
 
  
  - third-party attacks: 13.1.3. Third-Party Attacks
 
    - 13.1.10. Protecting Services
 
  
 
  
  - tools and supplies for: 27.5.5. Keeping a Cache of Tools and Supplies
 
  
  - Trojan horse, ICMP and: 22.4. ICMP and Network Diagnostics
 
  
  - types of: 1.2. What Are You Trying to Protect Against?
 
  
  - using SSH: 18.2.5. Secure Shell (SSH)
 
  
  - weak TCP/IP implementations, exploiting: 4.8.2. Implementation Weaknesses
 
 
- Independent Computing Architecture (see ICA)
 
  - 18.3.3. Independent Computing Architecture (ICA) 
 
 
- independent screened subnet: 6.4.2. Independent Screened Subnets
 
- inetd process: 11.3.3. Which Services Should You Leave Enabled?
 
  
  - modifying for anonymous FTP: 17.1.4.1. Limiting access to information
 
  
  - services started by: 11.3.1.2. Services started by inetd
 
 
- information lookup services: 20.7. Information Lookup Services
 
- information theft: 1.2.1.3. Information theft
 
  
  - espionage: 1.2.2.4. Spies (industrial and otherwise)
 
 
- init process: 11.3.3. Which Services Should You Leave Enabled?
 
- insecure networks: 6.7.2. Insecure Networks
 
- installing
 
  
  - filesystems as read-only: 10.10.6.2. Mount filesystems as read-only
 
    - 11.5.3. Mount Filesystems as Read-Only
 
  
 
  
  - kernel: 11.5.1. Reconfigure and Rebuild the Kernel 
 
  
  - operating system: 10.9.1. Start with a Minimal Clean Operating System Installation
 
  
  - services: 10.10.5. Installing and Modifying Services
 
    
    - on Windows NT: 12.5. Installing and Modifying Services
 
    
    - on Unix/Linux: 11.4. Installing and Modifying Services
 
  
 
  
  - software on machine: 10.10.6. Reconfiguring for Production
 
    - 11.5. Reconfiguring for Production
 
  
 
 
- intelligent proxy servers: 9.3.3. Intelligent Proxy Servers
 
- interior gateway protocols (see routing protocols)
 
- interior routers: 6.3.3. Interior Router
 
  - 24.1. Screened Subnet Architecture
 
  
  - configuring: 24.1.2.1. Interior router
 
  
  - merging
 
    
    - with bastion host: 6.5.4. It's Dangerous to Merge the Bastion Host and the Interior Router
 
    
    - with exterior routers: 6.5.2. It's OK to Merge the Interior Router and the Exterior Router
 
  
 
  
  - multiple: 6.5.5. It's Dangerous to Use Multiple Interior Routers
 
 
- internal
 
  
  - bastion hosts: 10.2.3. Internal Bastion Hosts
 
  
  - firewalls: 6.7. Internal Firewalls
 
 
- Internet
 
  
  - conferencing services, real-time: 2.6. Real-Time Conferencing Services
 
  
  - connections to unbuilt bastion host: 10.8. Building a Bastion Host
 
  
  - Control Message Protocol (see ICMP)
 
    - 4.3.3. ICMP
 
  
 
  
  - defense in depth: 3.2. Defense in Depth
 
  
  - email over (see email)
 
  
  - logging activity on (see logs)
 
  
  - multiple connections to: 6.5.6. It's OK to Use Multiple Exterior Routers
 
  
  - Protocol (see IP)
 
  
  - Relay Chat (see IRC)
 
  
  - rewalls (see rewalls)
 
  
  - security resource: A.3.6. CERT-Advisory
 
  
  - services (see Internet services)
 
 
- Internet Cache Protocol (ICP): 15.5.1. Internet Cache Protocol (ICP)
 
- Internet Explorer: 2.2. The World Wide Web
 
  
  - security zones and: 15.2.5. Internet Explorer and Security Zones
 
 
- Internet games (see Quake computer games)
 
- Internet Group Management Protocol (IGMP): 22.2.3. Internet Group Management Protocol (IGMP)
 
- Internet Inter-Orb Protocol (IIOP): 14.5. Common Object Request Broker Architecture (CORBA) and Internet Inter-Orb Protocol (IIOP)
 
- Internet Message Access Protocol (see IMAP)
 
  - 16.7. Internet Message Access Protocol (IMAP)
 
 
- Internet Printing Protocol (IPP): 17.6.3. Other Printing Systems
 
- Internet Relay Chat (see IRC)
 
- Internet services: 2. Internet Services
 
  - 13. Internet Services and Firewalls
 
  
  - default deny stance: 3.5.1. Default Deny Stance: That Which Is Not Expressly Permitted Is Prohibited
 
  
  - default permit stance: 3.5.2. Default Permit Stance: That Which Is Not Expressly Prohibited Is Permitted
 
  
  - disabling: 10.10. Disabling Nonrequired Services
 
    
    - on Unix: 11.3.2. Disabling Services Under Unix
 
      - 11.3.4. Specific Unix Services to Disable
 
    
 
    
    - on Windows NT: 12.4.1. How Are Services Managed Under Windows NT?
 
      - 12.4.4. Which Services Should You Leave Enabled?
 
    
 
  
 
  
  - evaluating risks of: 13.2.1. What Operations Does the Protocol Allow?
 
  
  - filtering by: 8.7. Filtering by Service
 
  
  - installing and/or modifying
 
    
    - on Windows NT: 12.5. Installing and Modifying Services
 
    
    - on Unix: 11.4. Installing and Modifying Services
 
  
 
  
  - installing/modifying: 10.10.5. Installing and Modifying Services
 
 
- intruders
 
  
  - pursuing and capturing: 27.3. Pursuing and Capturing the Intruder
 
  
  - recovering from: 27.1.7. Restore and Recover
 
  
  - revealing DNS information to: 20.1.4.5. Revealing too much information to attackers
 
  
  - reviewing response strategies: 27.4.8. Periodic Review of Plans
 
  
  - slower machines and: 10.3.2. How Fast a Machine?
 
  
  - types of: 1.2.2. Types of Attackers
 
 
- intrusions (see incidents)
 
- inzider program: 13.3. Analyzing Other Protocols
 
  - B.6.4. inzider
 
 
- IP addresses
 
  
  - in packet filtering rules: 8.4.4. Always Use IP Addresses, Never Hostnames
 
  
  - network address translation: 5.4.2.2. Embedded IP addresses are a problem for network address translation
 
 
- IP forwarding, disabling: 12.4.6. Turning Off Routing
 
- IP (Internet Protocol): 4.2. IP
 
  
  - fragmentation: 4.2.3. IP Fragmentation
 
  
  - multicasting: 19.6. Multicast and the Multicast Backbone (MBONE)
 
  
  - nested over IP: 4.3.4. IP over IP and GRE
 
  
  - packet layer: 4.1.1.2. IP layer
 
  
  - packet routes to (see traceroute program)
 
  
  - source route option: 4.2.2. IP Options
 
  
  - status and control messages: 4.3.3. ICMP
 
  
  - Version 6 (IPv6): 4.6. IP Version 6
 
 
- IP security protocol (IPsec): 14.9. IPsec
 
- IP source route option: 4.2.2. IP Options
 
- IP spoofing: 4.8.3. IP Spoofing
 
- ipchains filtering system: 8.9.1. Linux ipchains and Masquerading
 
  
  - masquerading and: 8.9.1.6. Using ipchains (including masquerading)
 
  
  - compared to ipfilter: 8.9.3. Comparing ipfilter and ipchains
 
 
- ipfilter filtering system: 8.9.2. ipfilter
 
  
  - compared to ipchains: 8.9.3. Comparing ipfilter and ipchains
 
 
- IPP (Internet Printing Protocol): 17.6.3. Other Printing Systems
 
- IPsec (IP security protocol): 14.9. IPsec
 
- IPsec Policy Agent: 12.4.4. Which Services Should You Leave Enabled?
 
- IRC (Internet Relay Chat): 2.6. Real-Time Conferencing Services
 
  - 19.1. Internet Relay Chat (IRC)
 
 
- IRDP (ICMP Router Discovery Protocol): 22.2.4. Router Discovery/ICMP Router Discovery Protocol (IRDP)
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.