[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
I/O
[See input/output, portable library] ICMP (Internet Control Message Protocol)
2nd
3rd
Icove, David (Computer Crime: A Crimefighter's Handbook)
id command
IDEA (International Data Encryption Algorithm)
ident daemon
2nd
identd daemon
Identification Protocol
identifiers
2nd
[See also GIDs; UIDs; usernames] Idora (Gibson, William)
IDS (intrusion detection system)
IEEE Computer Society
IFIP Technical Committee 11
IFS variable
2nd
3rd
IGMP (Internet Group Management Protocol)
IM (Instant Messaging)
IMAP (Internet Message Access Protocol)
imap service
IMAPS (secure IMAP)
immutable files
in.named daemon
incremental backup
indecency laws
index nodes
[See inodes] industrial spies
inetd program
2nd
-t (trace) option
back doors in
configuration changes in
denial of service attacks with
replacing with tcpserver program
TCP Wrappers and
2nd
throttle for
inetd.conf file
2nd
3rd
4th
5th
information as an asset
availability of
confidentiality of
[See confidentiality] disclosed by programmed threats
integrity of
[See integrity] owners of
Information Security
Information Systems Security Association (ISSA)
information warfare researchers
InfoSecurity News (SC Magazine)
init process
init program
initialization errors
initialization files, system
inittab file
inittab program
2nd
inodes
change time
[See ctime] detecting changes in
for device files
running out of, as overload attack
input/output (I/O), portable library
insects, effects on hardware
Insecure.org web site
installation cables
new Unix system
software, logging
Instant Messaging (IM)
insurance actions against intruders required to recover losses
contingency plans for break-ins and
coverage for business interruption
coverage for damage by law enforcement
data on probability of loss
2nd
filing claims with
identifying coverage
2nd
inventory required to recover losses from
log files helping recover losses
of personnel from outside agency
security policy required to recover losses
integrity
2nd
3rd
append-only files and
detecting changes to data
immutable files and
importance of
Kerberos and
kernel security levels and
LDAP and
NFS and
read-only filesystems and
Samba and
security checklist for
software for checking
tools for checking
International Data Encryption Algorithm (IDEA)
International Federation for Information Processing, Technical Committee 11
International Information Systems Security Certification Consoritium, Inc. (ISC)2
Internet
addresses
[See IP addresses] domain as NIS domain
firewalls
[See firewalls] history of
2nd
pornography and
programmed threats coming from
security and
security of Unix systems on
Internet Control Message Protocol
[See ICMP] Internet daemon
[See inetd program]2nd
[See inetd program] Internet Group Management Protocol (IGMP)
Internet Message Access Protocol (IMAP)
Internet Packet Exchange (IPX)
Internet Protocol
Internet Relay Chat (IRC)
Internet Security Scanner
[See ISS] Internet servers
books about
bringing up securely
controlling access to
inetd starting
location of
restricted filesystems and
startup of
types of
Internet Service Provider (ISP), finding information about
Internet services
[See network services] Internet Society
Internet worm program
Internetworking with TCP/IP (Comer, Douglas E.)
intruders
2nd
[See also break-ins; hackers] authors of programmed threats
case studies of
contacting
2nd
discovering
getting rid of
monitoring
recovering from damage by
tracing connection of
tracking through log files
Intrusion Detection (Bace, Rebecca)
intrusion detection system (IDS)
investigations of employees
ioctl() system call
IP addresses
controlling access by
determining from hostnames
finding information about
monitoring for security
name service and
IP networks
2nd
[See also TCP/IP networks] alternatives to
attacks on
2nd
authentication for, improving
decoy systems for
encryption and
firewalls for
hardening against attacks
physical isolation of
IP packets
2nd
eavesdropping
monitoring
sniffing
2nd
IP protocols
IP spoofing
2nd
3rd
ipchains program
2nd
ipf program
ipfilter program
ipfirewall program
ipfw program
2nd
3rd
IPsec
iptables program
2nd
IPv4 (IP Version 4)
IPv6 (IP Version 6)
IPX (Internet Packet Exchange)
IRC (Internet Relay Chat)
ISO 9660 filesystem
ISP (Internet Service Provider), finding information about
ISS (Internet Security Scanner)
2nd
ISSA (Information Systems Security Association)
|