Previous Page
Next Page

Index

A

absolute mode, permissions, 287–288
access control, 18–20. See also permissions
ACLs, 293–295
centralized vs. decentralized, 20
DAC (discretionary access control), 18–19
devices, 152
MAC (mandatory access control), 19
overview, 18
physical access, 71
RBAC (role-based access control), 19–20
review, 296
test answers, 299–300
test questions, 297–298
access control lists. See ACLs (access control lists)
accountability
logs and audit trails, 9
overview, 8–9
accreditation
in certification, evaluation, and accreditation process, 81–82
risk assessment and, 43
ACK packets, in three-way handshake, 185–187
ACLs (access control lists)
adding to files, 294–295
final test answers, 496
final test questions, 472
Kerberos, 387
listing files with an ACL, 294
modifying ACLs, 295
review, 296
test answers, 300–301
test questions, 298
test study guide, 438
UNIX file permissions compared with, 293, 438
active attacks, 46
advanced Trojan horses. See rootkits
AES algorithms, 314, 512
air conditioning, physical security and, 72
algorithms. See also by individual type
bit range, 307
message digest algorithms, 75
public or secret key, 438
symmetric and asymmetric, 306
allocate command, 159–160
allocate device-name command, 161, 432
amateur hackers, 45
AMD64 architecture, Solaris 10, 73–74
American Registry for Internet Numbers (ARIN), 52
anti-viruses, 221
APNIC (Asia Pacific Network Information Center), 52
applications
enabling Kerberized, 404
network application servers, 396–398
privileged applications, 257, 260
privileges, 259
SASL authentication, 356–358
security, 76
approval, non-repudiation of, 11
architecture, information security, 20–25
information security process, 24
information systems governance, 20–22
know your enemy, 24–25
weakest link, 24
ARIN (American Registry for Internet Numbers), 52
ASET (Automated Security Enhancement Tool)
blocking user access, 101
configuring, 227–230
ensuring correctness of path variables, 224
file protection with, 307
final test answers, 479, 487, 488
final test questions, 452, 460, 462
labs, answers, 250–251
labs, questions, 246
monitoring system files, 439
recommended use of, 434–435
running manually, 510
scheduling, 230
tasks and reports, 224
asetenv file, 228–229
Asia Pacific Network Information Center (APNIC), 52
assets, risk management, 40–41
assurance vs. functionality, in information security, 9–10, 37
asymmetric (public) keys. See also public/secret keys
final test answers, 486
final test questions, 460
overview, 306
attackers. See also secure systems
final test answers, 498
final test questions, 474
methods of, 46–50
motives of, 46
overview, 43–44
reconnaissance or information gathering, 51–54
review, 56–57
test answers, 63–64
test questions, 59–61
test study guide, 426–429
types of, 44–46, 51
UNIX vulnerabilities, 54
audit file storage, 125–128
audit logs, 472, 496
audit policies, 458, 485
audit trails
accountability and, 9
audit file storage, 125–126
final test answers, 477
final test questions, 449
generating, 136–138, 431
auditconfig command
authorization for, 258
final test answers, 485
final test questions, 458
updating auditing service, 135
viewing policy options, 125
audit_control file
adding as class to flags argument, 156–157, 431, 437
adding ot class to flags argument, 158–159, 432
adding ua class to flags argument, 437
audit classes, 125
audit roles, 269
disk space, 127
final test answers, 483, 489, 490, 493
final test questions, 456, 463, 465, 468
flags and naflags argument, 130, 430
audit_event file
event database, 131, 431
final test answers, 490, 495
final test questions, 465, 471
auditing
analyzing audit data, 136–138
audit trail generation, 136–138
configuring, 130
device allocation, 158–159
device policies, 155–156
enabling/disabling auditing service, 134–135
event classes, 130–131
event selection, 130–133, 507
final test answers, 497
final test questions, 473
labs, answers, 148–149
labs, questions, 144
list of important events, 122
optimizing, 129
planning, 123
review, 139–140
roles, 269
storing audit files, 125–128
syslog configuration, 133–134
test answers, 145–149
test questions, 141–144
test study guide, 430–431
updating auditing service, 135
user selection, 131–133
what to audit, 123–125
auditreduce command
creating audit trails, 136–138, 431
final test answers, 481
final test questions, 453
audit_script, 430
audit_user file
final test answers, 495
final test questions, 471
specifying users for auditing, 507
user database, 131–133, 431
audit_warn script
disk space alerts, 127–128, 430
final test answers, 493
final test questions, 469
authentication
cryptography and, 306
defined, 424
final test answers, 481, 484
final test questions, 454, 457
overview, 6–7
public and secrets keys and, 334
what you are methods, 8
what you have methods, 7
what you know methods, 7
authorization
applications that check, 436
defined, 256, 424
device allocation, 160
final test answers, 494, 495
final test questions, 470, 471
in identify-authenticate-authorize sequence, 8
RBAC (role-based access control), 257–258
Authorizations tab, Solaris Management Console, 264
auths command, 462, 488
Automated Security Enhancement Tool. See ASET(Automated Security Enhancement Tool)
availability
in C-I-A triad, 5–6
defined, 5, 424
DoS (denial of service) attacks, 180
in wired and wireless networks, 74

Previous Page
Next Page