C
- C
programming language, The Birth of Unix, FSF and GNU, Software Quality, Coding Standards, Things to Avoid
- ANSI C compiler
for, Coding Standards
- ANSI
standards for, Software Quality
- buffer overflows,
avoiding, Things to Avoid
- GNU, FSF and GNU
- C
shell, Conventions Used in This Book (see csh)
- C, a Reference Manual (Harbison, Samuel P. and Steele, Guy L.,
Jr.), Unix Programming and System Administration
- C2
audit, Essential Log Files
- cables,
network, Lightning, Network cables, Network cables, Wiretapping, Wiretapping, Fiber optic cable, Destructive Attacks
- cutting, as
destructive attack, Destructive Attacks
- fiber
optic, Fiber optic cable
- routing of, Lightning, Network cables
- tampering detectors
for, Wiretapping
- wiretapping, Wiretapping
- caching, Device Files, Authentication and DNS, DNS nameserver attacks
- efficient use
of, Device Files
- nameserver, poisoning of, Authentication and DNS, DNS nameserver attacks
- call forwarding, Protection of Modems and Lines
- callback schemes, One-Way Phone Lines, Additional Security for Modems
- Caller-ID
(CNID), Caller-ID and Automatic Number Identification–Caller-ID and Automatic Number Identification, Additional Security for Modems
- calls,
system, Conventions Used in This Book (see system calls)
- capabilities system,
Linux, Linux Capabilities–Linux Capabilities
- car bombs, as
destructive attack, Destructive Attacks
- carbon monoxide detectors, Smoke
- case, of usernames, Unix Usernames
- cat
command, The /etc/passwd File, Viewing Accounts in the Network Database, The Solaris ncheck command, Hidden files and directories
- CD-ROM, mounted read-only, Read-Only Filesystems
- CDA (Communications
Decency Act), Communications Decency Act
- CDFs
(context-dependent files), Hidden files and directories
- ceilings, dropped,
access through, Raised floors and dropped ceilings
- cellular
phones, Electrical noise
- Cerf, Vint, IP: The Internet Protocol
- CERIAS (Center
for Education and Research in Information Assurance and Security) web
site, CERIAS
- CERT/CC (Computer Emergency Response Team
Coordination Center), CERT-advisory, Computer Emergency Response Team Coordination Center (CERT/CC)
- contact information
for, Computer Emergency Response Team Coordination Center (CERT/CC)
- mailing list
for, CERT-advisory
- change
detection, Running Tripwire (see files, detecting changes
to)
- Chapman, D. Bren (Building
Internet Firewalls), Network Technology and Security
- character
devices, Device Files, Device Files
- chargen service, TCP, UDP, echo and chargen (TCP and UDP Ports 7 and 19)
- chattr() system
call, The chflags command
- chdir()
system call, Design Principles, Limiting network servers
- checklists for detecting
changes, Checklists and Metadata
- checksums, Upgrading Distributed Applications, Checksums and Signatures
- Cheswick, Bill
(Firewalls and Internet Security), Network Technology and Security
- chflags() system call, The chflags command
- chfn
command, finger (TCP Port 79), Monitoring File Format
- chgrp
command, chgrp: Changing a File’s Group
- child pornography, Child pornography
- child
processes, Creating Processes
- Children’s Internet Protection
Act, Mandatory blocking
- chkey
command, Proving your identity
- chmod
command, chmod: Changing a File’s Permissions–chmod: Changing a File’s Permissions, Setting a File’s Permissions, Restricting Logins
- absolute form, Setting a File’s Permissions
- symbolic form, chmod: Changing a File’s Permissions–chmod: Changing a File’s Permissions
- chosen plaintext attacks, Cryptanalysis
- chown command, chown: Changing a File’s Owner–Use chown with caution
- Christiansen, Tom
(Programming Perl), Miscellaneous References
- chroot
jail, DNS best practices
- chroot() system call, Setting up anonymous FTP with the standard Unix FTP server
- with anonymous FTP, Setting up anonymous FTP with the standard Unix FTP server
- chroot() system
call, What the Superuser Can Do, Using chroot( ), Restricted Filesystem with the chroot( ) Jail–Checking new software, Setting up the chroot( ) environment
- jail()
as alternative to, Setting up the chroot( ) environment
- using in programs, Using chroot( )
- chrootuid
daemon, chrootuid
- chsh
command, Integrating One-Time Passwords with Unix
- CIAC web site, CIAC
- CIDR (Classless
InterDomain Routing), IP networks, CIDR addresses
- CIFS (Common Internet File
System), Network Filesystems (see SMB)
- ciphertext, The traditional crypt ( ) algorithm, A Cryptographic Example
- Class A addresses, Classical network addresses
- Class B addresses, Classical network addresses
- Class C addresses, Classical network addresses
- Class D addresses, Classical network addresses
- Class E addresses, Classical network addresses
- classical network
addresses, Classical network addresses
- Classless InterDomain Routing
(CIDR), IP networks, CIDR addresses
- cleaning personnel, Other People
- Clear to Send (CTS), The RS-232 Serial Protocol
- cleartext, The traditional crypt ( ) algorithm
- client authentication, SSH, Client authentication with SSH
- client flooding, Authentication and DNS
- client-side NFS
security, Client-Side NFS Security
- client/server model, Clients and Servers
- clients,
NIS, NIS Fundamentals (see NIS)
- Clipper
encryption chip, Key Length with Symmetric Key Algorithms
- clock,
system, File Times, NTP: Network Time Protocol (UDP Port 123)–An NTP example, Setting the window, Picking a Random Seed
- changing, File Times
- for random
seeds, Picking a Random Seed
- Secure RPC
timestamp, Setting the window
- synchronizing, NTP: Network Time Protocol (UDP Port 123)–An NTP example
- clogging (SYN flood
attacks), Clogging (SYN Flood Attacks)
- closelog() system call, Unix syslog
- clri
command, Tree structure attacks
- CMW (Compartmented-Mode Workstation)
environment, “Secure” Versions of Unix
- CNID
(Caller-ID), Caller-ID and Automatic Number Identification–Caller-ID and Automatic Number Identification
- COAST (Computer Operations, Audit, and Security
Technology), CERIAS
- code
breakers, Introduction: Some Fundamental Questions (see intruders)
- Code Breakers: The Inside Story
of Bletchley Park (Hinsley, F. H. and
Stripp, Alan), Cryptography Books
- codebook
attacks, Common Symmetric Key Algorithms
- codebooks, One-Time Passwords, Codebooks
- The
Codebreakers (Kahn,
David), Cryptography Books
- CodeCenter (Centerline), Before You Finish
- collision, message digest
values, Message Digest Algorithms at Work
- Combined Log
Format, access_log Log File
- Comer, Douglas E., Xinu, Network Technology and Security
- (Internetworking with
TCP/IP), Network Technology and Security
- Xinu
developed by, Xinu
- command
shells, Shell History (see shells)
- commands, Conventions Used in This Book, rexec (TCP Port 512), Design Principles, Design Principles, Accounts That Run a Single Command, Accounts That Run a Single Command, Trusted computing base
- (see also specific
command names)
- accounts running
single, Accounts That Run a Single Command
- format used in
book, Conventions Used in This Book
- remote
execution of, rexec (TCP Port 512)
- running
simultaneously, Design Principles, Design Principles
- (see also multitasking)
- trusted computing
base (TCB) of, Trusted computing base
- commenting
out services, Primary Unix Network Services
- COMMIT function (RPC), The NFS Protocol
- Common Criteria book, Adding Up the Numbers
- Common Internet File System
(CIFS), Network Filesystems (see SMB)
- Common Log
Format, access_log Log File
- Common Object Request Broker Architecture
(CORBA), Remote Procedure Call (RPC)
- Communications Decency Act
(CDA), Communications Decency Act
- Communications of the
ACM, Computer Viruses and Programmed Threats
- community strings
(SNMP), SNMP: Simple Network Management Protocol (UDP Ports 161 and 162)
- comparison
copies, Comparison Copies–rdist
- compartmentalization of system
privileges, Linux Capabilities
- Compartmented-Mode Workstation (CMW)
environment, “Secure” Versions of Unix
- compliance audits, Compliance Audits
- Compressed SLIP
(CSLIP), IP: The Internet Protocol
- Computer Audit Update, Security Periodicals
- computer crime, Computer Crime (see legal
issues)
- Computer Crime: A
Crimefighter’s Handbook (Icove, David;
Seger, Karl; VonStorch, William), Computer Crime and Law
- computer
criminals, Introduction: Some Fundamental Questions (see intruders)
- Computer Emergency
Response Team Coordination
Center, Computer Emergency Response Team Coordination Center (CERT/CC) (see CERT/CC)
- computer
equipment, Protecting Computer Hardware (see hardware)
- Computer Fraud & Security Update, Security Periodicals
- Computer Law & Security Report, Security Periodicals
- Computer Operations,
Audit, and Security Technology (COAST), CERIAS
- Computer Oracle and Password
System, Network Scanning (see COPS)
- Computer Related Risks (Neumann, Peter G.), Computer-Related Risks
- computer
security, What Is Computer Security? (see security)
- Computer Security (Gollmann, Dieter), General Computer Security
- Computer Security Alert, Security Periodicals
- Computer Security
Basics (Russell, Deborah and Gangemi, G. T.,
Sr.), General Computer Security
- Computer Security Buyer’s
Guide, Security Products and Services Information, Security Periodicals
- Computer Security
Handbook (Hunt, A. E.; Bosworth, S.; Hoyt,
D. B.), General Computer Security
- Computer Security Institute (CSI), Security Periodicals, Computer Security Institute (CSI)
- Computer Security Journal, Security Periodicals
- Computer Security: A
Comprehensive Controls Checklist (Wood,
Charles Cresson, et al.), General Computer Security
- Computer
Systems Research Group (CSRG), NetBSD, FreeBSD, and OpenBSD
- computers, Protecting Computer Hardware (see hardware)
- Computers &
Security, General Computer Security, Security Periodicals
- Computers Under Attack:
Intruders, Worms, and Viruses (Denning,
Peter J.), Computer Viruses and Programmed Threats
- Computrace
tracking system, Laptop Recovery Software and Services
- Concurrent Versions System
(CVS), Primary Unix Network Services, CVS, Building an Automatic Backup System
- confidentiality, Types of Security, Remember that employees are people too, Responsible Disclosure, Network-Based Authentication Systems, Authentication, data integrity, and secrecy, Data integrity and privacy, Integrity Management, The Need for Integrity
- (see also encryption; integrity)
- compared with
integrity, The Need for Integrity
- compared with
security through obscurity, Responsible Disclosure
- of employee
information, Remember that employees are people too
- Kerberos
and, Authentication, data integrity, and secrecy
- Samba
and, Data integrity and privacy
- configuration files, What Is an Operating System?, Primary Unix Network Services, Configuration files, DNS nameserver attacks, Building an Automatic Backup System, Immutable and Append-Only Files, The syslog.conf configuration file–The syslog.conf configuration file, Rotating Logs with newsyslog, The Swatch configuration file, Informational material, Network Setup, Abusing Automatic Mechanisms
- immutable, Immutable and Append-Only Files
- logging, Informational material
- nameserver, DNS nameserver attacks
- networks, Network Setup
- newsyslog
program, Rotating Logs with newsyslog
- paper
copies of, Building an Automatic Backup System
- protecting, Abusing Automatic Mechanisms
- security
of, Primary Unix Network Services
- sendmail, Configuration files
- Swatch
program, The Swatch configuration file
- syslog facility, The syslog.conf configuration file–The syslog.conf configuration file
- connection
laundering, Who’s on the Internet?
- connectionless servers
(NFS), Connectionless and stateless
- connections, IP Security, Tracing a Connection–Tracing a Connection, Getting Rid of the Intruder
- hijacking, IP Security
- tracing, Tracing a Connection–Tracing a Connection
- unplugging, Getting Rid of the Intruder
- connectors,
network, Network connectors
- conserver program, Monitoring the Intruder
- consistency of software, Types of Security
- console
device, Device Files
- CONSOLE
variable, Secure Terminals
- console.perms
file, /etc/logindevperm
- consultants, security, Outsourcing Options (see vendors,
security)
- contact information, Comments and Questions
- context, for a
process, Processes and Programs
- context-dependent files
(CDFs), Hidden files and directories
- contingency
planning, The Disaster Recovery Plan (see disaster planning)
- contractors,
security, Outsourcing Options (see vendors, security)
- control
characters, Conventions Used in This Book, Unix Usernames, Verifying your new password, Good Passwords: Locked Doors, Directories and links, Directory Permissions
- conventions
for, Conventions Used in This Book
- in directory
names, Directories and links
- in filenames, Directory Permissions
- in passwords, Verifying your new password, Good Passwords: Locked Doors
- in usernames, Unix Usernames
- conventions used in this
book, Conventions Used in This Book
- cookies, magic
(Xauthority), Using Xauthority magic cookies
- Cooper, Simon
(Building Internet Firewalls), Network Technology and Security
- copper network cables, routing
of, Lightning
- COPS (Computer Oracle
and Password System), Network Scanning, Electronic Resources, COPS (Computer Oracle and Password System)
- copyright, Comparison Copies, The Responsibility to Report Crime, Access Devices and Copyrighted Software, Copyrighted Works
- comparison copies
violating, Comparison Copies
- disabling controls
for, Copyrighted Works
- notices in
source code and datafiles, The Responsibility to Report Crime
- unlicensed software
and, Access Devices and Copyrighted Software
- CORBA (Common Object
Request Broker Architecture), Remote Procedure Call (RPC)
- core files, Things to Avoid, gcore: Dumping Core
- correctness of data
and software, Types of Security (see consistency of software
integrity)
- cost-benefit
analysis, Cost-Benefit Analysis and Best Practices–Convincing Management, Cost-Benefit Analysis and Best Practices, Best Practices–Best Practices
- (see also risks, assessment
of)
- best practices as alternative
to, Best Practices–Best Practices
- Count Zero (Gibson, William), Understanding the Computer Security “Culture”
- covert
channels, Systems-based attacks
- cp
command, Understanding Filesystems, Simple Local Copies
- cpio
program, Building an Automatic Backup System, Simple Archives
- CPU overload
attacks, CPU overload attacks
- Crack program, Cracking Your Own Passwords
- cracklib, Joetest: a simple password cracker
- crashes,
logging, Exception and activity reports
- CRC
checksums, Checksums and Signatures (see checksums)
- CREATE function (RPC), The NFS Protocol
- Cred table (NIS+), NIS+ Tables and Other Objects
- crimes,
computer-related, Computer Crime (see legal issues)
- criminal complaints,
filing, Filing a Criminal Complaint–Federal jurisdiction
- criminals, as authors of programmed
threats, Introduction: Some Fundamental Questions, Authors
- (see also intruders)
- Crocker, Steve, Picking a Random Seed
- cron daemon, system clock
and, Sudden changes in time
- cron
file, Building an Automatic Backup System, Simple listing, Filename attacks
- crontab
files, Which Files to Back Up?, cron, crontab entries, /tmp Problems
- crypt encryption
program, The traditional crypt ( ) algorithm
- crypt() system
call, The Unix Encrypted Password System–crypt16( ), DES Extended, and Modular Crypt Format, Tips on Using Passwords, Algorithm and Library Changes–Algorithm and Library Changes
- crypt16
algorithm, crypt16( ), DES Extended, and Modular Crypt Format
- cryptanalysis, Cryptanalysis–Cryptanalysis
- Cryptfs virtual filesystem, The Virtual Filesystem Interface
- CryptoCard, Token Cards
- cryptographic
filesystems, Understanding Filesystems, The Virtual Filesystem Interface
- cryptography, Understanding Cryptography–Cryptographic Algorithms and Functions, Understanding Cryptography, Roots of Cryptography, Roots of Cryptography, Cryptography as a Dual-Use Technology, Cryptographic Algorithms and Functions, Cryptographic Algorithms and Functions, Message Digest Functions–Attacks on Message Digest Functions, Secure RPC (AUTH_DES), Secure RPC Authentication, Limitations of Secure RPC, Cryptographic Programs and Export Controls, Chapter 7: Cryptography Basics, Cryptography Books–Cryptography Papers and Other Publications
- (see also encryption)
- applications
of, Cryptography as a Dual-Use Technology
- export controls,
and, Cryptographic Programs and Export Controls
- history
of, Roots of Cryptography
- hybrid
public/private cryptosystems, Cryptographic Algorithms and Functions
- message digest
functions, Cryptographic Algorithms and Functions, Message Digest Functions–Attacks on Message Digest Functions
- published
resources on, Cryptography Books–Cryptography Papers and Other Publications
- Secure RPC
implementation, Secure RPC (AUTH_DES), Limitations of Secure RPC
- security
checklist for, Chapter 7: Cryptography Basics
- techniques
of, Roots of Cryptography
- Cryptography and Data
Security (Denning, Dorothy E.
R.), Cryptography Books
- Cryptography and Network
Security: Principles and Practices
(Stallings, William), Network Technology and Security
- csh (C
shell), Conventions Used in This Book, Problems with SUID, Built-in shell autologout, Before You Finish, Shell History, Shell Features
- (see also shells)
- autologout
variable, Built-in shell autologout
- history file, Shell History
- programs using, Before You Finish
- prompt for, Conventions Used in This Book
- .cshrc file, Built-in shell autologout, Changes to startup files, .cshrc, .kshrc, .tcshrc
- CSI (Computer Security Institute), Security Periodicals, Computer Security Institute (CSI)
- CSLIP (Compressed
SLIP), IP: The Internet Protocol
- CSRG (Computer Systems
Research Group), NetBSD, FreeBSD, and OpenBSD
- ctime, Inodes, File Times, chmod: Changing a File’s Permissions, Large Service-Based Networks with Large Budget
- CTS (Clear to Send), The RS-232 Serial Protocol
- cu command, Modems and Unix, Originate testing, Originate testing, Privilege testing
- The
Cuckoo’s Egg (Stoll,
Cliff), Understanding the Computer Security “Culture”
- current
directory, Current Directory and Paths
- Curry,
David, trimlog
- CVS
(Concurrent Versions System), Primary Unix Network Services, CVS, Building an Automatic Backup System
- Cyberpunk: Outlaws and Hackers
on the Computer Frontier (Hafner, Katie and
Markoff, John), Understanding the Computer Security “Culture”
- Cyrus SASL (Simple
Authentication and Security Layer), Pluggable Authentication Modules (PAM)