Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: D
- DAC (Discretionary Access Controls)
: 4.1.3. Groups and Group Identifiers (GIDs)
- daemon (user)
: 4.1. Users and Groups
- damage, liability for
: 26.4.6. Liability for Damage
- DARPA
: (see ARPA)
- DAT (Digital Audio Tape)
: 7.1.4. Guarding Against Media Failure
- data
      
  - assigning owners to
: 2.4.4.1. Assign an owner
  
- availability of
: 2.1. Planning Your Security Needs
  
- communication equipment (DCE)
: 14.3. The RS-232 Serial Protocol
  
- confidential
  
    
    - 2.1. Planning Your Security Needs
    
- 2.5.2. Confidential Information
  
  
  - disclosure of
: 11.2. Damage
  
- giving away with NIS
: 19.4.5. Unintended Disclosure of Site Information with NIS
  
- identifying assets
: 2.2.1.1. Identifying assets
  
- integrity of
: (see integrity, data)
  
- spoofing
: 16.3. IP Security
  
- terminal equipment (DTE)
: 14.3. The RS-232 Serial Protocol
      
- Data Carrier Detect (DCD)
: 14.3. The RS-232 Serial Protocol
- Data Defense Network (DDN)
: F.3.4.20. MILNET
- Data Encryption Standard
: (see DES)
- Data Set Ready (DSR)
: 14.3. The RS-232 Serial Protocol
- Data Terminal Ready (DTR)
: 14.3. The RS-232 Serial Protocol
- database files
: 1.2. What Is an Operating System?
- databases
: (see network databases)
- date command
        
  - 8.1.3. Accounts That Run a Single Command
  
- 24.5.1. Never Trust Anything Except Hardcopy
  
- day-zero backups
: 7.1.3. Types of Backups
- dbx debugger
: C.4. The kill Command
- DCE (data communication equipment)
: 14.3. The RS-232 Serial Protocol
- DCE (Distributed Computing Environment)
    
  - 3.2.2. The /etc/passwd File and Network Databases
  
- 8.7.3. Code Books
  
- 16.2.6.2. Other naming services
  
- 19.2. Sun's Remote Procedure Call (RPC)
  
- 19.7.1. DCE
     
- dd command
 
  - 6.6.1.2. Ways of improving the security of crypt
  
- 7.4.1. Simple Local Copies
  
- DDN (Data Defense Network)
: F.3.4.20. MILNET
- deadlock
: 23.2. Tips on Avoiding Security-related Bugs
- debug command
: 17.3.4.2. Using sendmail to receive email
- debugfs command
: 25.2.2.8. Tree-structure attacks
- DEC (Digital Equipment Corporation)
: F.3.4.9. Digital Equipment Corporation and customers
- DECnet protocol
: 16.4.3. DECnet
- decode aliases
: 17.3.4.2. Using sendmail to receive email
- decryption
: (see encryption)
- defamation
: 26.4.7. Harassment, Threatening Communication,  and Defamation
- default
          
  - accounts
: 8.1.2. Default Accounts
  
- deny
: 21.1.1. Default Permit vs. Default Deny
  
- domain
: 16.2.3. Hostnames
  
- permit
: 21.1.1. Default Permit vs. Default Deny
    
- defense in depth
: (see multilevel security)
- DELETE key
: 3.4. Changing Your Password
- deleting
   
  - destructive attack via
: 25.1. Destructive Attacks
  
- files
: 5.4. Using Directory Permissions
  
- demo accounts
: 8.1.2. Default Accounts
- denial-of-service attacks
  
  - 1.5. Role of This Book
  
- 25. Denial of Service Attacks and Solutions
  
- 25.3.4. Clogging
  
- accidental
: 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service
  
- automatic lockout
: 3.3. Entering Your Password
  
- checklist for
: A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
  
- inodes
: 25.2.2.3. Inode problems
  
- internal inetd services
: 17.1.3. The /etc/inetd Program
  
- on networks
  
         
    - 25.3. Network Denial of Service Attacks
    
- 25.3.4. Clogging
  
  
  - via syslog
: 10.5.1. The syslog.conf Configuration File
  
- X Window System
: 17.3.21.5. Denial of service attacks under X
  
- departure of employees
: 13.2.6. Departure
- depository directories, FTP
: 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
- DES (Data Encryption Standard)
   
  - 6.4.1. Summary of Private Key Systems
  
- 6.4.4. DES
  
- 6.4.5.2. Triple DES
  
- 8.6.1. The crypt() Algorithm
  
- authentication (NIS+)
: 19.5.4. Using NIS+
  
- improving security of
  
      
    - 6.4.5. Improving the Security of DES
    
- 6.4.5.2. Triple DES
  
  
- des program
 
  - 6.4.4. DES
  
- 6.6.2. des: The Data Encryption Standard
  
- 7.4.4. Encrypting Your Backups
   
- destroying media
: 12.3.2.3. Sanitize your media before disposal
- destructive attacks
: 25.1. Destructive Attacks
- detached signatures
: 6.6.3.6. PGP detached signatures
- detectors
    
  - cable tampering
: 12.3.1.1. Wiretapping
  
- carbon-monoxide
: 12.2.1.2. Smoke
  
- humidity
: 12.2.1.11. Humidity
  
- logging alarm systems
: 10.7.1.1. Exception and activity reports
  
- smoke
: 12.2.1.2. Smoke
  
- temperature alarms
: 12.2.1.6. Temperature extremes
  
- water sensors
: 12.2.1.12. Water
       
- Deutsches Forschungsnetz
: F.3.4.14. Germany: DFN-WiNet Internet sites
- /dev directory
: 14.5.1. Hooking Up a Modem to Your Computer
  
  - /dev/audio device
: 23.8. Picking a Random Seed
  
- /dev/console device
: 5.6. Device Files
  
- /dev/kmem device
  
   
    - 5.6. Device Files
    
- 11.1.2. Back Doors and Trap Doors
  
  
  - /dev/null device
: 5.6. Device Files
  
- /dev/random device
: 23.7.4. Other random number generators
  
- /dev/swap device
: 5.5.1. SUID, SGID, and Sticky Bits
  
- /dev/urandom device
: 23.7.4. Other random number generators
    
- device files
: 5.6. Device Files
- devices
  
  - managing with SNMP
: 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports 161 and 162)
  
- modem control
: 14.5.2. Setting Up the UNIX Device
  
- Devices file
: 14.5.1. Hooking Up a Modem to Your Computer
- df -i command
: 25.2.2.3. Inode problems
- dictionary attack
: 8.6.1. The crypt() Algorithm
- Diffie-Hellman key exchange system
    
  - 6.4.2. Summary of Public Key Systems
  
- 18.6. Dependence on Third Parties
  
- 19.3. Secure RPC (AUTH_DES)
  
- breaking key
: 19.3.4. Limitations of Secure RPC
  
- exponential key exchange
: 19.3.1. Secure RPC Authentication
     
- Digital Audio Tape (DAT)
: 7.1.4. Guarding Against Media Failure
- digital computers
: 6.1.2. Cryptography and Digital Computers
- Digital Equipment Corporation (DEC)
: F.3.4.9. Digital Equipment Corporation and customers
- Digital Signature Algorithm
: (see DSA)
- digital signatures
     
  - 6.4. Common Cryptographic Algorithms
  
- 6.5. Message Digests and Digital Signatures
  
- 6.5.5.2. Message authentication codes
  
- 9.2.3. Checksums and Signatures
  
- checksums
: 6.5.5.1. Checksums
  
- detached signatures
: 6.6.3.6. PGP detached signatures
  
- with PGP
: 6.6.3.4. Adding a digital signature to an announcement
       
- Digital UNIX
 
  - 1.3. History of UNIX
  
- (see also Ultrix)
  
- directories
 
  - 5.1.1. Directories
  
- 5.1.3. Current Directory and Paths
  
- ancestor
: 9.2.2.2. Ancestor directories
  
- backing up by
: 7.1.3. Types of Backups
  
- CDFs (context-dependent files)
: 24.4.1.7. Hidden files and directories
  
- checklist for
: A.1.1.4. Chapter 5: The UNIX Filesystem
  
- dot, dot-dot, and /
: 5.1.1. Directories
  
- FTP depositories
: 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
  
- immutable
: 9.1.1. Immutable and Append-Only Files
  
- listing automatically (Web)
: 18.2.2.2. Additional configuration issues
  
- mounted
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
  
- mounting secure
: 19.3.2.5. Mounting a secure filesystem
  
- nested
: 25.2.2.8. Tree-structure attacks
  
- NFS
: (see NFS)
  
- permissions
: 5.4. Using Directory Permissions
  
- read-only
: 9.1.2. Read-only Filesystems
  
- restricted
  
                 
    - 8.1.5. Restricted Filesystem
    
- 8.1.5.2. Checking new software
  
  
  - root
: (see root directory)
  
- SGI and sticky bits on
: 5.5.6. SGID and Sticky Bits on Directories
  
- Web server structure of
  
   
    - 18.2.2. Understand Your Server's Directory Structure
    
- 18.2.2.2. Additional configuration issues
  
  
  - world-writable
: 11.6.1.1. World-writable user files and directories
 
- <Directory> blocks
 
  - 18.3.1. The access.conf and .htaccess Files
  
- 18.3.2. Commands Within the <Directory> Block
  
- 18.3.2.1. Examples
   
- disaster recovery
: 12.2.6.4. Minimizing downtime
- disk attacks
  
  - 25.2.2. Disk Attacks
  
- 25.2.2.8. Tree-structure attacks
  
- disk quotas
: 25.2.2.5. Using quotas
- diskettes
: (see backups; media)
- dismissed employees
: 13.2.6. Departure
- disposing of materials
: 12.3.3. Other Media
- Distributed Computing Environment
: (see DCE)
- DNS (Domain Name System)
      
  - 16.2.6. Name Service
  
- 16.2.6.2. Other naming services
  
- 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
  
- 17.3.6.2. DNS nameserver attacks
  
- nameserver attacks
: 17.3.6.2. DNS nameserver attacks
  
- rogue servers
: 16.3.2. Security and Nameservice
  
- security and
: 16.3.2. Security and Nameservice
  
- zone transfers
  
        
    - 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
    
- 17.3.6.1. DNS zone transfers
  
  
- documentation
 
  - 2.5. The Problem with Security  Through Obscurity
  
- 23.2. Tips on Avoiding Security-related Bugs
  
- domain name
: 16.2.3. Hostnames
- Domain Name System
: (see DNS)
- domainname command
: 19.4.3. NIS Domains
- domains
: 19.4.3. NIS Domains
- dormant accounts
     
  - 8.4. Managing Dormant Accounts
  
- 8.4.3. Finding Dormant Accounts
  
- dot (.) directory
: 5.1.1. Directories
- dot-dot (..) directory
: 5.1.1. Directories
- Double DES
: 6.4.5. Improving the Security of DES
- double reverse lookup
: 16.3.2. Security and Nameservice
- DOW USA
: F.3.4.10. DOW USA
- downloading files
: 12.3.4. Protecting Local Storage
      
  - logging
  
 
    - 10.3.3. xferlog Log File
    
- 10.3.5. access_log Log File
  
  
- downtime
: 12.2.6.4. Minimizing downtime
 
  - due to criminal investigations
: 26.2.4. Hazards of Criminal Prosecution
  
- logging
: 10.7.2.1. Exception and activity reports
  
- drand48 function
: 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  )
- drills, security
: 24.1.3. Rule #3: PLAN AHEAD
- drink
: 12.2.2.1. Food and drink
- DSA (Digital Signature Algorithm)
    
  - 6.4.2. Summary of Public Key Systems
  
- 6.5.3. Digital Signatures
  
- DTE (data terminal equipment)
: 14.3. The RS-232 Serial Protocol
- du command
: 25.2.2.1. Disk-full attacks
- dual universes
: 5.9.1. Dual Universes
- ducts, air
: 12.2.3.2. Entrance through air ducts
- dump/restore program
     
  - 7.1.3. Types of Backups
  
- 7.4.3. Specialized Backup Programs
  
- 7.4.4. Encrypting Your Backups
   
- dumpster diving
: 12.3.3. Other Media
- duress code
: 8.7.2. Token Cards
- dust
: 12.2.1.3. Dust
   
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.