[OpenVMS documentation]
[Site home] [Send comments] [Help with this site] [How to order documentation] [OpenVMS site] [Compaq site]
Updated: 11 December 1998

OpenVMS Guide to System Security


Previous Contents Index

T
Tampering with system files, detecting
Tapes
    default security elements
    managing security profiles
TASK objects
TCB (trusted computing base)
    file protection
    hardware #1
    hardware #2
    privileges and
    software #1
    software #2
    software not included
Template devices, security elements of
Terminal emulator
Terminal emulators
Terminal lines
Terminals
    breaking dialup connection
    C2 system restrictions #1
    C2 system restrictions #2
    clearing DECwindows screen
    clearing the screen #1
    clearing the screen #2
    controlling access #1
    controlling access #2
    default security elements
    dialup login
    failing to respond
    hardcopy
        disposing of output
    limiting access
    lines for modems, security of
    logout considerations
    modifying security profiles
    port
    requiring a system password
    security alarms and
    session logging
    system password
        requirement for
    usage restrictions
    user, in C2 systems
    virtual #1
    virtual #2
    virtual #3
    virtual #4
    virtual #5
Time
    auditing changes to system time
    synchronizing cluster time
Time-of-day login restrictions
Time-stamp, synchronizing in cluster
Time-stamps
    synchronizing in cluster
TMPMBX privilege
Training of users, importance to security
Trojan horse programs #1
Trojan horse programs #2
TTY_DEFCHAR2 system parameter
    disabling virtual terminals
    enabling system passwords for remote logins
TTY_TIMEOUT system parameter, setting reconnection time
U
UAFs (user authorization files)
    auditing modifications to
    enabling auditing through #1
    enabling auditing through #2
    modifications and security audit
    MODIFY user/FLAG=AUDIT #1
    MODIFY user/FLAG=AUDIT #2
    normal protection
    performance impact of enabling auditing
    privileges and #1
    privileges and #2
    record of last login
    synchronization with rights database
UIC groups
    design limitations
    designing
    impact on user privileges
UIC identifiers
    deleting when employee leaves
    example #1
    example #2
UICs (user identification codes)
    adding to rights database
    alphanumeric
    C2 systems and
    changing an object's
    format
    group restrictions
    guidelines for creating
    numeric
    object access evaluations and
    process
    storage of
    uniqueness requirement for clustered systems
    zero
Unshareable devices, access requirements
UPGRADE privilege
Use access
User accounts
    security considerations
User authorization
    account expiration
    login class restrictions
    privilege use
    shift restrictions
User irresponsibility
    as security problem
    training as antidote
User name mapping
User names as identifiers #1
User names as identifiers #2
User penetration as security problem
User probing as security problem
User training
User-written system services
    replacing with protected subsystems
Users
    access through ACEs
    C2 systems and
    displaying process rights identifiers
    displaying rights
    file security and
    granting privileges
    introduction to system
    protection code categories
    requesting access
    security categories of #1
    security categories of #2
    security categories of #3
    security profiles of
    setting default object protection
    training
    trusted #1
    trusted #2
    untrusted
V
VAXcluster environments
    C2 system restrictions
    protected objects
Verification using two passwords
Virtual terminals #1
Virtual terminals #2
    disabling
    disconnected processes and
    logging out of
Viruses
VMS$OBJECTS.DAT file
Volatile database
    network
VOLPRO privilege #1
VOLPRO privilege #2
Volumes
    access requirements
    as protected objects
    auditing mounts or dismounts
    erasing data
    events audited
    foreign
        access requirements
    privilege requirements
    profile storage
    protection
    reusing in C2 systems
    security elements of
    template profile
    types of access
VT100-series terminals, clearing screen
VT200-series terminals, clearing screen
W
Weekday login restrictions
Welcome messages
    security disadvantages
Wildcard characters
    in ADD/IDENTIFIER command
    in SHOW/RIGHTS command
Work restrictions
Workstations
    clearing screen
    default security elements
WORLD privilege
    impact on SHOW PROCESS command
World users (security category) #1
World users (security category) #2
Write access
    devices
    files #1
    files #2
    global sections
    granting through ACLs
    granting through protection codes
    logical name tables
    resource domains
    security class
    volumes


Previous Next Contents Index

[Site home] [Send comments] [Help with this site] [How to order documentation] [OpenVMS site] [Compaq site]
[OpenVMS documentation]

Copyright © Compaq Computer Corporation 1998. All rights reserved.

Legal
6346PRO_INDEX_007.HTML