[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DAC (Discretionary Access Controls) 
Daemen, Joan 
daemon user 
daemons 
Dalheimer, Mattias K. (Running Linux) 
Dalton, Chris I. 
DARPA  [See ARPA]
data  [See also data protection; information]
    backing up  [See backups]
    confidentiality of  [See confidentiality]
    encryption of  [See encryption]
    integrity of  [See integrity]
data bits 
Data Carrier Detect (DCD) 
data communication equipment (DCE) 
Data Encryption Algorithm (DEA) 
Data Encryption Standard  [See DES]
data protection  2nd  [See also backups]
    eavesdropping 
    local storage 
    real-world example 
    sanitizing media before disposal 
    theft, from 
    unattended terminals 
Data Set Ready (DSR) 
data spoofing 
data terminal equipment (DTE) 
Data Terminal Ready (DTR) 
databases  [See also network authentication systems]
    network 
    system 
date account 
Dawson, Terry (Running Linux) 
day-zero backup  [See level-zero backup]
daytime service  2nd 
dbx debugger 
DCD (Data Carrier Detect) 
DCE (data communication equipment) 
DCE (Distributed Computing Environment)  2nd  3rd  4th  5th  6th 
dd command  2nd 
DDoS (Distributed Denial of Service) attacks 
DEA (Data Encryption Algorithm) 
deadlock 
DEBUG command, SMTP 
debugfs command  2nd  3rd 
DECnet 
decode aliases 
decoy systems 
decryption 
default accounts 
default domain 
defense in depth  [See multilevel security]2nd  [See multilevel security]
demo accounts 
denial of service attacks  2nd 
    accidental 
    automatic account lockout 
    causes of 
    destructive  2nd 
    distributed (DDoS) 
    internal inetd services 
    logging to /dev/console causing 
    on networks 
    overload  2nd 
    security checklist for 
    syslog causing 
    types of 
Denning, Dorothy E. R. (Cryptography and Data Security) 
Denning, Peter J. (Computers Under Attack: Intruders, Worms, and Viruses) 
Department of Justic (DOJ) 
deployment environments 
depository directories, FTP 
DES (Data Encryption Standard)  2nd 
    example of 
    Kerberos using 
    key length of 
    NIS+ 
    weakness of 
des command  2nd 
DES Extended format 
The Design and Implementation of the 4.4 BSD UNIX Operating System (McKusick, Marshall Kirk; Bostic, 
The Design of the UNIX Operating System (Bach, Maurice) 
destroying media 
destructive denial of service attacks  2nd 
detectors
    cable tampering 
    carbon monoxide 
    fire alarms 
    humidity 
    logging alarm systems 
    motion 
    placement and monitoring of 
    smoke 
    temperature alarms 
    water sensors 
/dev directory
    /dev/audio device 
    /dev/console device 
    /dev/kmem device  2nd 
    /dev/null device 
    /dev/random device 
    /dev/swap device 
    /dev/urandom device 
device files 
devices
    access, legal definition of 
    back door in 
    backup, world-readable 
    configuring on local area network 
    logging information about 
    managing with SNMP 
    modem control 
    random number sources 
    superuser control of 
Devices file 
df -i command 
dfstab file  2nd 
dfstab script 
DHCP protocol 
dictionary attack 
diff program 
differential backup 
differential cryptanalysis 
differential fault analysis 
differential power analysis 
differential timing analysis 
Diffie, Whitfield  2nd 
    "New Directions in Cryptography" 
    "The First Ten Years of Public-Key Cryptography" 
Diffie-Hellman exponential key exchange system  2nd  3rd  4th  5th  6th 
Digital Millennium Copyright Act (DMCA) 
Digital Signature Algorithm (DSA) 
Digital Signature Standard (DSS)  2nd 
digital signatures  2nd  [See also signatures, data]
    distributed with software 
    DSA (Digital Signature Algorithm) 
    DSS (Digital Signature Standard)  2nd 
    HMAC as alternative to 
    message digest algorithms used for  2nd 
    public key cryptography used with  2nd 
    RSA as basis for 
directories  2nd  3rd  [See also files]
    ancestor, detecting changes to 
    CDFs (context-dependent files) 
    current 
    FTP depositories 
    home 
        security of 
    links to 
    mounted 
    nested, tree structure attacks on 
    NFS  [See NFS]
    permissions for  2nd 
    SGID and sticky bits on 
    world-writable 
directory services  [See Kerberos system LDAP NIS NIS+]
dired mode, GNU Emacs 
Disappearing Cryptography (Wayner, Peter) 
disaster planning  2nd 
Disaster Recovery Journal 
discard service  2nd 
Discretionary Access Controls (DAC) 
disk drives  [See also media]
    destructive attacks to 
    difficulty of sanitizing 
    filling up, as overload attack 
    Firewire-based 
    hidden space on 
    logging information about 
    partitioning 
    partitions, backups by 
    quotas for 
    reserved space on 
    write-protect switches for  2nd 
Distributed Computing Environment  [See DCE]2nd  [See DCE]
Distributed Denial of Service (DDoS) attacks 
DMCA (Digital Millennium Copyright Act) 
DNS (Domain Name System)  2nd 
    attacks on 
    client flooding 
    dynamic 
    nameserver attacks 
    nameserver cache poisoning 
    Public Key Infrastructure (PKI) 
    rogue servers 
    security and  2nd 
    security precautions for 
    zone transfers  2nd 
DNS and BIND (Albitz, Paul and Liu, Cricket) 
DNSSEC 
Dobbertin, Hans 
documentation
    of break-in 
    log books 
    log files, hardcopy of  2nd 
    manuals  2nd 
    software 
DOJ (Department of Justice) 
dollar sign ($), as Unix Bourne or Korn shell prompt 
domain name  2nd 
Domain Name System  [See DNS]
domain service  2nd 
domain socket 
domainname command 
domains (NIS) 
dormant accounts 
    disabling automatically 
    disabling by changing password 
    finding 
dot (.) directory  2nd 
dot-dot (..) directory  2nd 
double reverse lookup 
downtime, logging 
dpkg package management system 
drand48() system call 
Dreyfus, Suelette (Underground) 
drinks, effects on hardware 
DSA (Digital Signature Algorithm) 
DSR (Data Set Ready) 
DSS (Digital Signature Standard)  2nd 
DTE (data terminal equipment) 
DTR (Data Terminal Ready) 
du command 
due care  [See best practices]
dump program  2nd  3rd 
DUMP request 
dumpster diving 
duress code 
dust, effects on hardware 
DVD, mounted read-only 
dynamic DNS