Index
Symbols
- /bin/login program (Unix), Trojan horse attacks on, Trojan horses and back doors
- /bin/mail program, race condition attack on, Race conditions
- /bin/sh program, buffer overflow attack involving, Buffer overflows
- /etc/passwd file, Trojan horse attacks on, Trojan horses and back doors
A
- access to computer systems, removing or restricting, Involving the Critical Players
- administration (IRTs), flexibility of, Summary
- administrative support, IRT, Roles and Responsibilities
- administrator privileges
- gaining in buffer overflow attacks, Buffer overflows
- setuid exploits, attacks involving, setuid exploits
- adversarial customer relationships, Friend or Foe?
- adversary, defined, About the Bad Guys
- advertising IRT services, Awareness and Advertising
- advisories and threat monitoring, commercial IRTs, Commercial Teams
- alphanumeric messages, pager support for, Page-Back Mechanisms
- analog connections, modem
- analog converters, Modems
- phone lines for, Modems
- wireless communications, using instead of, Wireless modems
- analysis and documentation process, support needed in tools, If We Ruled the World
- analyst, information protection, Roles and Responsibilities
- analyzing
- attacks, Network-Based Tools
- forensic information, Forensics
- (see also forensics)
- incidents, What Is Incident Response?
- antivirus software
- distributing over intranet, Internal Teams
- Trend Micro products, Antivirus Products
- vendor web sites, Antivirus Products
- applications
- checksums, forensic data from, Forensics
- default configuration residue, attacks involving, ...
Get Incident Response now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.