Index

Symbols

/bin/login program (Unix), Trojan horse attacks on, Trojan horses and back doors
/bin/mail program, race condition attack on, Race conditions
/bin/sh program, buffer overflow attack involving, Buffer overflows
/etc/passwd file, Trojan horse attacks on, Trojan horses and back doors

A

access to computer systems, removing or restricting, Involving the Critical Players
administration (IRTs), flexibility of, Summary
administrative support, IRT, Roles and Responsibilities
administrator privileges
gaining in buffer overflow attacks, Buffer overflows
setuid exploits, attacks involving, setuid exploits
adversarial customer relationships, Friend or Foe?
adversary, defined, About the Bad Guys
advertising IRT services, Awareness and Advertising
advisories and threat monitoring, commercial IRTs, Commercial Teams
alphanumeric messages, pager support for, Page-Back Mechanisms
analog connections, modem
analog converters, Modems
phone lines for, Modems
wireless communications, using instead of, Wireless modems
analysis and documentation process, support needed in tools, If We Ruled the World
analyst, information protection, Roles and Responsibilities
analyzing
attacks, Network-Based Tools
forensic information, Forensics
(see also forensics)
incidents, What Is Incident Response?
antivirus software
distributing over intranet, Internal Teams
Trend Micro products, Antivirus Products
vendor web sites, Antivirus Products
applications
checksums, forensic data from, Forensics
default configuration residue, attacks involving, ...

Get Incident Response now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.