[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
C programming language
ANSI C compiler for
ANSI standards for
buffer overflows, avoiding
GNU
C shell
[See csh] C, a Reference Manual (Harbison, Samuel P. and Steele, Guy L., Jr.)
C2 audit
cables, network
cutting, as destructive attack
fiber optic
routing of
2nd
tampering detectors for
wiretapping
caching efficient use of
nameserver, poisoning of
2nd
call forwarding
callback schemes
2nd
Caller-ID (CNID)
2nd
calls, system
[See system calls] capabilities system, Linux
car bombs, as destructive attack
carbon monoxide detectors
case, of usernames
cat command
2nd
3rd
4th
CD-ROM, mounted read-only
CDA (Communications Decency Act)
CDFs (context-dependent files)
ceilings, dropped, access through
cellular phones
Cerf, Vint
CERIAS (Center for Education and Research in Information Assurance and Security) web site
CERT/CC (Computer Emergency Response Team Coordination Center) contact information for
mailing list for
change detection
[See files, detecting changes to] Chapman, D. Bren (Building Internet Firewalls)
character devices
2nd
chargen service
2nd
3rd
chattr() system call
chdir() system call
2nd
checklists for detecting changes
checksums
2nd
Cheswick, Bill (Firewalls and Internet Security)
chflags() system call
chfn command
2nd
chgrp command
child pornography
child processes
Children's Internet Protection Act
chkey command
chmod command
absolute form
symbolic form
chosen plaintext attacks
chown command
Christiansen, Tom (Programming Perl)
chroot jail
chroot() system call with anonymous FTP
2nd
3rd
jail() as alternative to
using in programs
chrootuid daemon
chsh command
CIAC web site
CIDR (Classless InterDomain Routing)
2nd
CIFS (Common Internet File System)
[See SMB] ciphertext
2nd
Class A addresses
Class B addresses
Class C addresses
Class D addresses
Class E addresses
classical network addresses
Classless InterDomain Routing (CIDR)
2nd
cleaning personnel
Clear to Send (CTS)
cleartext
client authentication, SSH
client flooding
client-side NFS security
client/server model
clients, NIS
[See NIS] Clipper encryption chip
clock, system changing
for random seeds
Secure RPC timestamp
synchronizing
clogging (SYN flood attacks)
closelog() system call
clri command
CMW (Compartmented-Mode Workstation) environment
CNID (Caller-ID)
COAST (Computer Operations, Audit, and Security Technology)
code breakers
[See intruders] Code Breakers: The Inside Story of Bletchley Park (Hinsley, F. H. and Stripp, Alan)
codebook attacks
codebooks
2nd
The Codebreakers (Kahn, David)
CodeCenter (Centerline)
collision, message digest values
Combined Log Format
Comer, Douglas E. (Internetworking with TCP/IP)
Xinu developed by
command shells
[See shells] commands
[See also specific command names] accounts running single
format used in book
remote execution of
running simultaneously
2nd
[See also multitasking] trusted computing base (TCB) of
commenting out services
COMMIT function (RPC)
Common Criteria book
Common Internet File System (CIFS)
[See SMB] Common Log Format
Common Object Request Broker Architecture (CORBA)
Communications Decency Act (CDA)
Communications of the ACM
community strings (SNMP)
comparison copies
compartmentalization of system privileges
Compartmented-Mode Workstation (CMW) environment
compliance audits
Compressed SLIP (CSLIP)
Computer Audit Update
computer crime
[See legal issues] Computer Crime: A Crimefighter's Handbook (Icove, David; Seger, Karl; VonStorch, William)
computer criminals
[See intruders] Computer Emergency Response Team Coordination Center
[See CERT/CC] computer equipment
[See hardware] Computer Fraud & Security Update
Computer Law & Security Report
Computer Operations, Audit, and Security Technology (COAST)
Computer Oracle and Password System
[See COPS] Computer Related Risks (Neumann, Peter G.)
computer security
[See security] Computer Security (Gollmann, Dieter)
Computer Security Alert
Computer Security Basics (Russell, Deborah and Gangemi, G. T., Sr.)
Computer Security Buyer's Guide
2nd
Computer Security Handbook (Hunt, A. E.; Bosworth, S.; Hoyt, D. B.)
Computer Security Institute (CSI)
2nd
Computer Security Journal
Computer Security: A Comprehensive Controls Checklist (Wood, Charles Cresson, et al.)
Computer Systems Research Group (CSRG)
computers
[See hardware] Computers & Security
2nd
Computers Under Attack: Intruders, Worms, and Viruses (Denning, Peter J.)
Computrace tracking system
Concurrent Versions System (CVS)
2nd
3rd
confidentiality
2nd
3rd
[See also encryption; integrity] compared with integrity
compared with security through obscurity
of employee information
Kerberos and
Samba and
configuration files
immutable
logging
nameserver
networks
newsyslog program
paper copies of
protecting
security of
sendmail
Swatch program
syslog facility
connection laundering
connectionless servers (NFS)
connections hijacking
tracing
unplugging
connectors, network
conserver program
consistency of software
console device
CONSOLE variable
console.perms file
consultants, security
[See vendors, security] contact information
context, for a process
context-dependent files (CDFs)
contingency planning
[See disaster planning] contractors, security
[See vendors, security] control characters conventions for
in directory names
in filenames
in passwords
2nd
in usernames
conventions used in this book
cookies, magic (Xauthority)
Cooper, Simon (Building Internet Firewalls)
copper network cables, routing of
COPS (Computer Oracle and Password System)
2nd
3rd
copyright comparison copies violating
disabling controls for
notices in source code and datafiles
unlicensed software and
CORBA (Common Object Request Broker Architecture)
core files
2nd
correctness of data and software
[See consistency of software integrity] cost-benefit analysis
2nd
[See also risks, assessment of] best practices as alternative to
Count Zero (Gibson, William)
covert channels
cp command
2nd
cpio program
2nd
CPU overload attacks
Crack program
cracklib
crashes, logging
CRC checksums
[See checksums] CREATE function (RPC)
Cred table (NIS+)
crimes, computer-related
[See legal issues] criminal complaints, filing
criminals, as authors of programmed threats
[See also intruders]2nd
Crocker, Steve
cron daemon, system clock and
cron file
2nd
3rd
crontab files
2nd
3rd
4th
crypt encryption program
crypt() system call
2nd
3rd
crypt16 algorithm
cryptanalysis
Cryptfs virtual filesystem
CryptoCard
cryptographic filesystems
2nd
cryptography
2nd
[See also encryption]3rd
applications of
export controls, and
history of
hybrid public/private cryptosystems
message digest functions
2nd
published resources on
Secure RPC implementation
2nd
security checklist for
techniques of
Cryptography and Data Security (Denning, Dorothy E. R.)
Cryptography and Network Security: Principles and Practices (Stallings, William)
csh (C shell)
2nd
[See also shells] autologout variable
history file
programs using
prompt for
.cshrc file
2nd
3rd
CSI (Computer Security Institute)
2nd
CSLIP (Compressed SLIP)
CSRG (Computer Systems Research Group)
ctime
2nd
3rd
4th
CTS (Clear to Send)
cu command
2nd
3rd
4th
The Cuckoo's Egg (Stoll, Cliff)
current directory
Curry, David
CVS (Concurrent Versions System)
2nd
3rd
Cyberpunk: Outlaws and Hackers on the Computer Frontier (Hafner, Katie and Markoff, John)
Cyrus SASL (Simple Authentication and Security Layer)
|