Полезная информация

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: D

DAC (Discretionary Access Controls) : 4.1.3. Groups and Group Identifiers (GIDs)
daemon (user) : 4.1. Users and Groups
damage, liability for : 26.4.6. Liability for Damage
DARPA : (see ARPA)
DAT (Digital Audio Tape) : 7.1.4. Guarding Against Media Failure
data
assigning owners to : 2.4.4.1. Assign an owner
availability of : 2.1. Planning Your Security Needs
communication equipment (DCE) : 14.3. The RS-232 Serial Protocol
confidential
2.1. Planning Your Security Needs
2.5.2. Confidential Information
disclosure of : 11.2. Damage
giving away with NIS : 19.4.5. Unintended Disclosure of Site Information with NIS
identifying assets : 2.2.1.1. Identifying assets
integrity of : (see integrity, data)
spoofing : 16.3. IP Security
terminal equipment (DTE) : 14.3. The RS-232 Serial Protocol
Data Carrier Detect (DCD) : 14.3. The RS-232 Serial Protocol
Data Defense Network (DDN) : F.3.4.20. MILNET
Data Encryption Standard : (see DES)
Data Set Ready (DSR) : 14.3. The RS-232 Serial Protocol
Data Terminal Ready (DTR) : 14.3. The RS-232 Serial Protocol
database files : 1.2. What Is an Operating System?
databases : (see network databases)
date command
8.1.3. Accounts That Run a Single Command
24.5.1. Never Trust Anything Except Hardcopy
day-zero backups : 7.1.3. Types of Backups
dbx debugger : C.4. The kill Command
DCE (data communication equipment) : 14.3. The RS-232 Serial Protocol
DCE (Distributed Computing Environment)
3.2.2. The /etc/passwd File and Network Databases
8.7.3. Code Books
16.2.6.2. Other naming services
19.2. Sun's Remote Procedure Call (RPC)
19.7.1. DCE
dd command
6.6.1.2. Ways of improving the security of crypt
7.4.1. Simple Local Copies
DDN (Data Defense Network) : F.3.4.20. MILNET
deadlock : 23.2. Tips on Avoiding Security-related Bugs
debug command : 17.3.4.2. Using sendmail to receive email
debugfs command : 25.2.2.8. Tree-structure attacks
DEC (Digital Equipment Corporation) : F.3.4.9. Digital Equipment Corporation and customers
DECnet protocol : 16.4.3. DECnet
decode aliases : 17.3.4.2. Using sendmail to receive email
decryption : (see encryption)
defamation : 26.4.7. Harassment, Threatening Communication, and Defamation
default
accounts : 8.1.2. Default Accounts
deny : 21.1.1. Default Permit vs. Default Deny
domain : 16.2.3. Hostnames
permit : 21.1.1. Default Permit vs. Default Deny
defense in depth : (see multilevel security)
DELETE key : 3.4. Changing Your Password
deleting
destructive attack via : 25.1. Destructive Attacks
files : 5.4. Using Directory Permissions
demo accounts : 8.1.2. Default Accounts
denial-of-service attacks
1.5. Role of This Book
25. Denial of Service Attacks and Solutions
25.3.4. Clogging
accidental : 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
automatic lockout : 3.3. Entering Your Password
checklist for : A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
inodes : 25.2.2.3. Inode problems
internal inetd services : 17.1.3. The /etc/inetd Program
on networks
25.3. Network Denial of Service Attacks
25.3.4. Clogging
via syslog : 10.5.1. The syslog.conf Configuration File
X Window System : 17.3.21.5. Denial of service attacks under X
departure of employees : 13.2.6. Departure
depository directories, FTP : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
DES (Data Encryption Standard)
6.4.1. Summary of Private Key Systems
6.4.4. DES
6.4.5.2. Triple DES
8.6.1. The crypt() Algorithm
authentication (NIS+) : 19.5.4. Using NIS+
improving security of
6.4.5. Improving the Security of DES
6.4.5.2. Triple DES
des program
6.4.4. DES
6.6.2. des: The Data Encryption Standard
7.4.4. Encrypting Your Backups
destroying media : 12.3.2.3. Sanitize your media before disposal
destructive attacks : 25.1. Destructive Attacks
detached signatures : 6.6.3.6. PGP detached signatures
detectors
cable tampering : 12.3.1.1. Wiretapping
carbon-monoxide : 12.2.1.2. Smoke
humidity : 12.2.1.11. Humidity
logging alarm systems : 10.7.1.1. Exception and activity reports
smoke : 12.2.1.2. Smoke
temperature alarms : 12.2.1.6. Temperature extremes
water sensors : 12.2.1.12. Water
Deutsches Forschungsnetz : F.3.4.14. Germany: DFN-WiNet Internet sites
/dev directory : 14.5.1. Hooking Up a Modem to Your Computer
/dev/audio device : 23.8. Picking a Random Seed
/dev/console device : 5.6. Device Files
/dev/kmem device
5.6. Device Files
11.1.2. Back Doors and Trap Doors
/dev/null device : 5.6. Device Files
/dev/random device : 23.7.4. Other random number generators
/dev/swap device : 5.5.1. SUID, SGID, and Sticky Bits
/dev/urandom device : 23.7.4. Other random number generators
device files : 5.6. Device Files
devices
managing with SNMP : 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports 161 and 162)
modem control : 14.5.2. Setting Up the UNIX Device
Devices file : 14.5.1. Hooking Up a Modem to Your Computer
df -i command : 25.2.2.3. Inode problems
dictionary attack : 8.6.1. The crypt() Algorithm
Diffie-Hellman key exchange system
6.4.2. Summary of Public Key Systems
18.6. Dependence on Third Parties
19.3. Secure RPC (AUTH_DES)
breaking key : 19.3.4. Limitations of Secure RPC
exponential key exchange : 19.3.1. Secure RPC Authentication
Digital Audio Tape (DAT) : 7.1.4. Guarding Against Media Failure
digital computers : 6.1.2. Cryptography and Digital Computers
Digital Equipment Corporation (DEC) : F.3.4.9. Digital Equipment Corporation and customers
Digital Signature Algorithm : (see DSA)
digital signatures
6.4. Common Cryptographic Algorithms
6.5. Message Digests and Digital Signatures
6.5.5.2. Message authentication codes
9.2.3. Checksums and Signatures
checksums : 6.5.5.1. Checksums
detached signatures : 6.6.3.6. PGP detached signatures
with PGP : 6.6.3.4. Adding a digital signature to an announcement
Digital UNIX
1.3. History of UNIX
(see also Ultrix)
directories
5.1.1. Directories
5.1.3. Current Directory and Paths
ancestor : 9.2.2.2. Ancestor directories
backing up by : 7.1.3. Types of Backups
CDFs (context-dependent files) : 24.4.1.7. Hidden files and directories
checklist for : A.1.1.4. Chapter 5: The UNIX Filesystem
dot, dot-dot, and / : 5.1.1. Directories
FTP depositories : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
immutable : 9.1.1. Immutable and Append-Only Files
listing automatically (Web) : 18.2.2.2. Additional configuration issues
mounted : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
mounting secure : 19.3.2.5. Mounting a secure filesystem
nested : 25.2.2.8. Tree-structure attacks
NFS : (see NFS)
permissions : 5.4. Using Directory Permissions
read-only : 9.1.2. Read-only Filesystems
restricted
8.1.5. Restricted Filesystem
8.1.5.2. Checking new software
root : (see root directory)
SGI and sticky bits on : 5.5.6. SGID and Sticky Bits on Directories
Web server structure of
18.2.2. Understand Your Server's Directory Structure
18.2.2.2. Additional configuration issues
world-writable : 11.6.1.1. World-writable user files and directories
<Directory> blocks
18.3.1. The access.conf and .htaccess Files
18.3.2. Commands Within the <Directory> Block
18.3.2.1. Examples
disaster recovery : 12.2.6.4. Minimizing downtime
disk attacks
25.2.2. Disk Attacks
25.2.2.8. Tree-structure attacks
disk quotas : 25.2.2.5. Using quotas
diskettes : (see backups; media)
dismissed employees : 13.2.6. Departure
disposing of materials : 12.3.3. Other Media
Distributed Computing Environment : (see DCE)
DNS (Domain Name System)
16.2.6. Name Service
16.2.6.2. Other naming services
17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
17.3.6.2. DNS nameserver attacks
nameserver attacks : 17.3.6.2. DNS nameserver attacks
rogue servers : 16.3.2. Security and Nameservice
security and : 16.3.2. Security and Nameservice
zone transfers
17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
17.3.6.1. DNS zone transfers
documentation
2.5. The Problem with Security Through Obscurity
23.2. Tips on Avoiding Security-related Bugs
domain name : 16.2.3. Hostnames
Domain Name System : (see DNS)
domainname command : 19.4.3. NIS Domains
domains : 19.4.3. NIS Domains
dormant accounts
8.4. Managing Dormant Accounts
8.4.3. Finding Dormant Accounts
dot (.) directory : 5.1.1. Directories
dot-dot (..) directory : 5.1.1. Directories
Double DES : 6.4.5. Improving the Security of DES
double reverse lookup : 16.3.2. Security and Nameservice
DOW USA : F.3.4.10. DOW USA
downloading files : 12.3.4. Protecting Local Storage
logging
10.3.3. xferlog Log File
10.3.5. access_log Log File
downtime : 12.2.6.4. Minimizing downtime
due to criminal investigations : 26.2.4. Hazards of Criminal Prosecution
logging : 10.7.2.1. Exception and activity reports
drand48 function : 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
drills, security : 24.1.3. Rule #3: PLAN AHEAD
drink : 12.2.2.1. Food and drink
DSA (Digital Signature Algorithm)
6.4.2. Summary of Public Key Systems
6.5.3. Digital Signatures
DTE (data terminal equipment) : 14.3. The RS-232 Serial Protocol
du command : 25.2.2.1. Disk-full attacks
dual universes : 5.9.1. Dual Universes
ducts, air : 12.2.3.2. Entrance through air ducts
dump/restore program
7.1.3. Types of Backups
7.4.3. Specialized Backup Programs
7.4.4. Encrypting Your Backups
dumpster diving : 12.3.3. Other Media
duress code : 8.7.2. Token Cards
dust : 12.2.1.3. Dust


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.