I
- I/O, The Birth of Unix (see input/output, portable
library)
- ICMP (Internet Control Message
Protocol), Packets and Protocols, ICMP, Service Overloading
- Icove, David (Computer Crime: A
Crimefighter’s Handbook), Computer Crime and Law
- id
command, The /etc/group file
- IDEA (International Data Encryption
Algorithm), Common Symmetric Key Algorithms
- ident daemon, Adding authentication to TCP/IP with ident–Adding authentication to TCP/IP with ident, What TCP Wrappers does
- identd
daemon, Adding authentication to TCP/IP with ident
- Identification Protocol, Identification Protocol (TCP Port 113)
- identifiers, Unix Usernames, Unix Usernames
- (see also GIDs; UIDs;
usernames)
- Idora
(Gibson, William), Understanding the Computer Security “Culture”
- IDS (intrusion
detection system), Intrusion Detection Systems
- IEEE Computer Society, IEEE Computer Society
- IFIP Technical Committee 11, IFIP, Technical Committee 11
- IFS variable, An example of a SUID attack: IFS and the /usr/lib/preserve hole, Tips on Writing SUID/SGID Programs, IFS attacks
- IGMP (Internet Group Management
Protocol), Packets and Protocols
- IM (Instant Messaging), Communicating with MUDs, Internet Relay Chat (IRC), and Instant Messaging
- IMAP (Internet Message Access
Protocol), POP, POPS: Post Office Protocol, and IMAP, IMAPS: Internet Message Access Protocol (TCP Ports 109, 110, 143, 993, 995)
- imap service, TCP
- IMAPS (secure
IMAP), POP, POPS: Post Office Protocol, and IMAP, IMAPS: Internet Message Access Protocol (TCP Ports 109, 110, 143, 993, 995)
- immutable files, Immutable and Append-Only Files–Kernel security level
- in.named
daemon, DNS under Unix
- incremental backup, Types of Backups
- indecency laws, Pornography, Indecency, and Obscenity–Child pornography
- index
nodes, Inodes (see inodes)
- industrial spies, Kinds of eavesdropping
- inetd
program, Starting the Servers, The inetd Program–The inetd Program, The inetd Program, Controlling Access to Servers, What TCP Wrappers does, Primary Unix Network Services, SMTP: Simple Mail Transfer Protocol (TCP Port 25), Logging Network Services, Back Doors and Trap Doors, Service Overloading
- -t (trace) option, Logging Network Services
- back doors
in, Back Doors and Trap Doors
- configuration changes
in, Primary Unix Network Services
- denial of service attacks
with, The inetd Program
- replacing with tcpserver
program, SMTP: Simple Mail Transfer Protocol (TCP Port 25)
- TCP Wrappers
and, Controlling Access to Servers, What TCP Wrappers does
- throttle
for, Service Overloading
- inetd.conf
file, The inetd Program–The inetd Program, Primary Unix Network Services, RPC rpc.rexd (TCP Port 512), Which Files to Back Up?, inetd.conf
- information, Types of Security, Types of Security, Types of Security, Identifying assets, Assign an owner, Damage
- as an
asset, Identifying assets
- availability
of, Types of Security
- confidentiality
of, Types of Security (see confidentiality)
- disclosed by
programmed threats, Damage
- integrity
of, Types of Security (see integrity)
- owners
of, Assign an owner
- Information Security, Security Periodicals
- Information
Systems Security Association (ISSA), Information Systems Security Association (ISSA)
- information warfare researchers, Authors
- InfoSecurity News (SC Magazine), Security Periodicals
- init
process, Common umask Values
- init program, Process #1: /etc/init
- initialization errors, Other initializations
- initialization
files, system, System initialization files
- inittab
file, Which Files to Back Up?
- inittab
program, Connecting a Modem to Your Computer, Process #1: /etc/init
- inodes, Inodes, Device Files, Large Service-Based Networks with Large Budget, Checklists and Metadata, inode problems
- change
time, Large Service-Based Networks with Large Budget (see ctime)
- detecting changes
in, Checklists and Metadata
- for device files, Device Files
- running out of, as
overload attack, inode problems
- input/output (I/O),
portable library, The Birth of Unix
- insects, effects on
hardware, Bugs (biological)
- Insecure.org web site, Insecure.org
- installation, Network cables, Updating System Software, Exception and activity reports
- cables, Network cables
- new Unix
system, Updating System Software
- software,
logging, Exception and activity reports
- Instant Messaging
(IM), Communicating with MUDs, Internet Relay Chat (IRC), and Instant Messaging
- insurance, Identifying assets, The Probability of a Loss, The Probability of a Loss, People, Nothing to Lose?, Auditing, Logging, and Forensics, Rule #3: Plan Ahead, Damage, Your Legal Options After a Break-in, The Responsibility to Report Crime, Criminal Hazards, Criminal Hazards, Chapter 25: Computer Crime
- actions against
intruders required to recover losses, Your Legal Options After a Break-in
- contingency plans
for break-ins and, The Responsibility to Report Crime
- coverage
for business interruption, Criminal Hazards
- coverage for damage
by law enforcement, Criminal Hazards
- data on probability
of loss, The Probability of a Loss, The Probability of a Loss
- filing claims
with, Rule #3: Plan Ahead
- identifying
coverage, Identifying assets, Chapter 25: Computer Crime
- inventory required
to recover losses from, Nothing to Lose?
- log files helping
recover losses, Auditing, Logging, and Forensics
- of personnel from outside agency, People
- security policy
required to recover losses, Damage
- integrity, Types of Security, Network-Based Authentication Systems, NIS+ Limitations, Authentication, data integrity, and secrecy, LDAP Integrity and Reliability, Understanding NFS, Data integrity and privacy, Integrity Management, The Need for Integrity–The Need for Integrity, Immutable and Append-Only Files–Kernel security level, Immutable and Append-Only Files–Kernel security level, Kernel security level, Read-Only Filesystems–Read-Only Filesystems, Detecting Changes After the Fact–Checksums and Signatures, Integrity-Checking Tools–Running Tripwire, Chapter 20: Integrity Management
- append-only
files and, Immutable and Append-Only Files–Kernel security level
- detecting
changes to data, Detecting Changes After the Fact–Checksums and Signatures
- immutable
files and, Immutable and Append-Only Files–Kernel security level
- importance
of, The Need for Integrity–The Need for Integrity
- Kerberos
and, Authentication, data integrity, and secrecy
- kernel security
levels and, Kernel security level
- LDAP
and, LDAP Integrity and Reliability
- NFS
and, Understanding NFS
- read-only
filesystems and, Read-Only Filesystems–Read-Only Filesystems
- Samba
and, Data integrity and privacy
- security checklist
for, Chapter 20: Integrity Management
- software for
checking, NIS+ Limitations
- tools
for checking, Integrity-Checking Tools–Running Tripwire
- International
Data Encryption Algorithm (IDEA), Common Symmetric Key Algorithms
- International Federation for Information
Processing, Technical Committee 11, IFIP, Technical Committee 11
- International Information Systems Security
Certification Consoritium, Inc. (ISC)2, International Information Systems Security Certification Consortium, Inc.
- Internet, Preface–Preface, Introduction: Some Fundamental Questions, The Internet, Today’s Internet, Internet Addresses, Securing TCP and UDP Services, Sun’s portmap/rpcbind, NIS Domains, Entry, Pornography, Indecency, and Obscenity–Child pornography
- addresses, Internet Addresses (see IP
addresses)
- domain as NIS
domain, NIS Domains
- firewalls, Sun’s portmap/rpcbind (see firewalls)
- history
of, Introduction: Some Fundamental Questions, The Internet
- pornography
and, Pornography, Indecency, and Obscenity–Child pornography
- programmed threats
coming from, Entry
- security
and, Preface–Preface
- security of Unix
systems on, Securing TCP and UDP Services
- Internet Control
Message Protocol, ICMP (see ICMP)
- Internet
daemon, Starting the Servers, The inetd Program (see inetd
program) (see inetd program)
- Internet Group
Management Protocol (IGMP), Packets and Protocols
- Internet Message
Access Protocol (IMAP), POP, POPS: Post Office Protocol, and IMAP, IMAPS: Internet Message Access Protocol (TCP Ports 109, 110, 143, 993, 995)
- Internet Packet Exchange
(IPX), Adding authentication to TCP/IP with ident
- Internet
Protocol, IP: The Internet Protocol–Other naming services
- Internet Relay Chat (IRC), Communicating with MUDs, Internet Relay Chat (IRC), and Instant Messaging
- Internet
Security Scanner, Network Scanning (see ISS)
- Internet servers, Securing TCP and UDP Services, Understanding Unix Internet Servers and Services, Starting the Servers, Starting the Servers, Startup on different Unix systems–Startup examples, The inetd Program–The inetd Program, Controlling Access to Servers, Summary, Limiting network servers
- books
about, Securing TCP and UDP Services
- bringing up
securely, Summary
- controlling access
to, Controlling Access to Servers
- inetd starting, The inetd Program–The inetd Program
- location
of, Starting the Servers
- restricted
filesystems and, Limiting network servers
- startup of, Startup on different Unix systems–Startup examples
- types
of, Starting the Servers
- Internet Service Provider (ISP), finding
information about, Contacting a site’s ISP
- Internet services, Understanding Unix Internet Servers and Services (see network
services)
- Internet Society, The Internet Society
- Internet worm
program, The Lesson of the Internet Worm–The Lesson of the Internet Worm
- Internetworking with
TCP/IP (Comer, Douglas
E.), Network Technology and Security
- intruders, Introduction: Some Fundamental Questions–Introduction: Some Fundamental Questions, Discovering a Break-in, Discovering an Intruder–Other tip-offs, What to Do When You Catch Somebody, Contacting the Intruder, Monitoring the Intruder, Tracing a Connection–Tracing a Connection, Getting Rid of the Intruder, Analyzing the Log Files, Assessing the Damage–Never Trust Anything Except Hardcopy, Case Studies–faxsurvey, Authors–Authors
- (see also break-ins; hackers)
- authors
of programmed threats, Authors–Authors
- case
studies of, Case Studies–faxsurvey
- contacting, What to Do When You Catch Somebody, Contacting the Intruder
- discovering, Discovering an Intruder–Other tip-offs
- getting rid
of, Getting Rid of the Intruder
- monitoring, Monitoring the Intruder
- recovering
from damage by, Assessing the Damage–Never Trust Anything Except Hardcopy
- tracing
connection of, Tracing a Connection–Tracing a Connection
- tracking through
log files, Analyzing the Log Files
- Intrusion Detection (Bace, Rebecca), General Computer Security
- intrusion detection system
(IDS), Intrusion Detection Systems
- investigations of employees, Intensive Investigations
- ioctl() system
call, Process groups and sessions
- IP
addresses, Eavesdropping over local area networks (Ethernet and twisted pairs), Internet Addresses–CIDR addresses, Name Service–Other naming services, Controlling Access to Servers, Domain Name System (DNS) (TCP and UDP Port 53), Looking up information by IP address
- controlling access
by, Controlling Access to Servers
- determining from
hostnames, Domain Name System (DNS) (TCP and UDP Port 53)
- finding information
about, Looking up information by IP address
- monitoring for
security, Eavesdropping over local area networks (Ethernet and twisted pairs)
- name
service and, Name Service–Other naming services
- IP networks, IP networks, IP networks, IP Security–IP Security, Using Encryption to Protect IP Networks from Eavesdropping–Using Encryption to Protect IP Networks from Eavesdropping, Hardening Against Attacks, Hardening Against Attacks, Firewalls and Physical Isolation, Firewalls and Physical Isolation, Improving Authentication–Adding authentication to TCP/IP with ident, Adding authentication to TCP/IP with ident, Decoy Systems
- (see also TCP/IP
networks)
- alternatives
to, Adding authentication to TCP/IP with ident
- attacks
on, IP Security–IP Security, Hardening Against Attacks
- authentication for,
improving, Improving Authentication–Adding authentication to TCP/IP with ident
- decoy systems
for, Decoy Systems
- encryption and, Using Encryption to Protect IP Networks from Eavesdropping–Using Encryption to Protect IP Networks from Eavesdropping
- firewalls
for, Firewalls and Physical Isolation
- hardening against
attacks, Hardening Against Attacks
- physical isolation
of, Firewalls and Physical Isolation
- IP
packets, Eavesdropping over local area networks (Ethernet and twisted pairs), IP: The Internet Protocol, Packets and Protocols–UDP, Using Encryption to Protect IP Networks from Eavesdropping–Using Encryption to Protect IP Networks from Eavesdropping, Using Encryption to Protect IP Networks from Eavesdropping, Telnet (TCP Port 23)
- eavesdropping, Using Encryption to Protect IP Networks from Eavesdropping–Using Encryption to Protect IP Networks from Eavesdropping
- monitoring, Eavesdropping over local area networks (Ethernet and twisted pairs)
- sniffing, Using Encryption to Protect IP Networks from Eavesdropping, Telnet (TCP Port 23)
- IP protocols, Packets and Protocols–UDP
- IP spoofing, Add-on Functionality Breeds Problems, IP Security, The TCP Wrappers configuration language
- ipchains
program, Using a Host-Based Packet Firewall, The ipfw host-based firewall
- ipf program, Using a Host-Based Packet Firewall
- ipfilter
program, Using a Host-Based Packet Firewall
- ipfirewall program, Using a Host-Based Packet Firewall
- ipfw
program, Controlling Access to Servers, Using a Host-Based Packet Firewall, The ipfw host-based firewall
- IPsec, Using Encryption to Protect IP Networks from Eavesdropping
- iptables
program, Using a Host-Based Packet Firewall, The ipfw host-based firewall
- IPv4 (IP Version
4), IP: The Internet Protocol–Other naming services
- IPv6 (IP Version
6), IP: The Internet Protocol
- IPX (Internet Packet
Exchange), Adding authentication to TCP/IP with ident
- IRC (Internet Relay
Chat), Communicating with MUDs, Internet Relay Chat (IRC), and Instant Messaging
- ISO 9660 filesystem, The Virtual Filesystem Interface
- ISP (Internet Service Provider), finding
information about, Contacting a site’s ISP
- ISS (Internet
Security Scanner), Network Scanning, ISS (Internet Security Scanner)
- ISSA (Information Systems Security
Association), Information Systems Security Association (ISSA)