B |
Backup operations
|
general recommendations
|
performed from captive privileged account
|
Backups
|
general recommendations
|
Batch identifiers
|
Batch jobs
|
affected by shift restrictions
|
authorization
|
password protection and cardreaders
|
Batch logins
|
Binary output from Audit Analysis utility
|
Break-in alarms
|
Break-in attempts
|
auditing #1
|
auditing #2
|
counteraction through dual passwords
|
detecting #1
|
detecting #2
|
evading
|
security audit report and
|
Break key and secure servers
|
BUGCHK privilege
|
Buses, default security elements
|
BYPASS privilege
|
description
|
effect on control access
|
overriding access controls #1
|
overriding access controls #2
|
C |
C2 environments
|
C2 security, systems
|
checklist for generating
|
criteria
|
documentation
|
effect of site changes on certification
|
object protection and
|
physical security requirements
|
software not included
|
SYSMAN databases
|
system parameters
|
system startup
|
Capability-based systems
|
Capability objects
|
as protected objects
|
elements of
|
reestablishing profile
|
template profile
|
types of access
|
Captive accounts
|
command procedures
|
Ctrl/Y key sequence and
|
disabling mail and notification of delivery
|
example of production account
|
locked passwords and
|
when to use #1
|
when to use #2
|
Card readers, default security elements
|
Case sensitivity
|
in passwords and user names
|
$CHECK_ACCESS system service, security auditing and
|
$CHECK_PRIVILEGE system service, reporting privilege use
|
$CHKPRO system service
|
role in access control
|
security auditing and
|
/CLITABLES qualifier #1
|
/CLITABLES qualifier #2
|
Cluster environments
|
building single security domain
|
C2 system restrictions
|
managing audit log file
|
protected object databases
|
protected objects
|
security considerations
|
security implementation
|
synchronizing authorization data
|
SYSMAN requirements
|
system file recommendations
|
system file requirements
|
Cluster managers and security administrators
|
CLUSTER_AUTHORIZE.DAT files #1
|
CLUSTER_AUTHORIZE.DAT files #2
|
CMEXEC privilege
|
CMKRNL privilege
|
Command mode for Audit Analysis utility, manipulating the display
|
Command procedures
|
access control strings in
|
STARTNET.COM
|
SYSTARTUP_VMS.COM
|
Commands, usage restrictions
|
Common event flag clusters
|
as protected objects
|
events audited
|
privilege requirements
|
reestablishing security profile
|
security elements of
|
system modifications of templates
|
template profile
|
types of access to
|
Communications devices
|
C2 system requirements
|
default security elements
|
Compilers, restricting use with ACLs
|
Confidential files, security auditing and
|
CONNECT command, /LOGOUT qualifier
|
Connections
|
auditing
|
Connections, auditing of
|
Console terminals
|
C2 system requirements
|
C2 systems and
|
HSC and C2 system requirements
|
Consoles, enabling passwords for
|
Control access
|
acquiring #1
|
acquiring #2
|
acquiring #3
|
common event flag clusters
|
devices
|
files
|
global sections
|
limitations
|
logical name tables
|
queues
|
resource domains
|
security class
|
volumes
|
COPY command
|
/PROTECTION qualifier
|
security profile assigned
|
Create access
|
logical name tables
|
volumes
|
CREATE/PROXY command in Authorize utility
|
CREATE/RIGHTS command in Authorize utility
|
Creator ACEs
|
example
|
with resource identifiers
|
Ctrl/B key sequence
|
Ctrl/Y key sequence and restricted accounts
|
D |
Database
|
volatile network
|
Databases
|
authorization #1
|
authorization #2
|
protected objects
|
rights
|
synchronizing authorization on clustered systems
|
DBG$ENABLE_SERVER identifier
|
C2 system restriction
|
DCL commands
|
SET HOST/DTE in network operations
|
SET TERMINAL in network operations
|
DCL tables, modifications for security
|
DDCMP (Digital Data Communications Message Protocol)
|
asynchronous driver
|
Debug server identifier
|
C2 system restriction
|
DEC/OSI full names
|
not in C2 evaluation
|
DECamds
|
software not in C2 evaluation
|
DECdns distributed name service
|
not in C2 evaluation
|
DECnet
|
C2 system restrictions
|
cluster nodes and
|
dynamic asynchronous connection #1
|
dynamic asynchronous connection #2
|
dynamic asynchronous connection #3
|
dynamic asynchronous connection #4
|
INBOUND parameter #1
|
INBOUND parameter #2
|
installing dynamic asynchronous connection #1
|
installing dynamic asynchronous connection #2
|
network objects #1
|
network objects #2
|
nonprivileged user name
|
receive password #1
|
receive password #2
|
receive passwords
|
transmit password
|
transmit passwords
|
Decryption
|
DECwindows screens, clearing #1
|
DECwindows screens, clearing #2
|
DECwindows screens, clearing #3
|
DECwindows software
|
not in C2 evaluation
|
Default attribute for ACEs
|
Default ownership
|
for directories
|
for files
|
for protected objects #1
|
for protected objects #2
|
Default protection
|
Alpha system files
|
for directories
|
for files
|
for processes #1
|
for processes #2
|
for VAX system files
|
management
|
Default Protection ACEs #1
|
Default Protection ACEs #2
|
Default Protection ACEs #3
|
generating default file protection #1
|
generating default file protection #2
|
Delete access
|
common event flag clusters
|
files
|
granting through protection codes
|
logical name tables
|
queues
|
through ACLs
|
through protection codes
|
volumes
|
DELETE command, /ERASE qualifier
|
DETACH privilege
|
Devices
|
access requirements
|
as protected objects
|
controlling access through ACLs
|
default security elements
|
events audited
|
modifying security profiles of
|
privilege requirements
|
profile storage
|
protecting BACKUP save sets
|
reusing in C2 systems
|
security elements of
|
spooled, access requirements
|
template security profiles
|
terminal configuration
|
DIAGNOSE privilege
|
Dialup identifiers
|
Dialup lines
|
connection security
|
controlling access to
|
using for dynamic asynchronous connection
|
using in a public area
|
Dialup logins
|
breaking connections
|
controlling retries
|
failures
|
retries
|
Directories
|
access control through ACLs
|
access requirements #1
|
access requirements #2
|
assigning a security profile
|
controlling access to files #1
|
controlling access to files #2
|
creating
|
events audited
|
ownership
|
by resource identifier
|
changing access to files
|
setting default
|
setting default file protection
|
setting file protection
|
DIRECTORY command, /SECURITY qualifier
|
Disconnected job messages
|
DISFORCE_PWD_CHANGE flag
|
Disk quotas
|
as restriction for users
|
charging to identifiers
|
Disk scavenging
|
discouraging
|
preventing #1
|
preventing #2
|
Disk space
|
charging to identifier
|
requirements for security audit log file
|
usage and charging
|
Disk volumes
|
controlling access
|
restrictions
|
Disks
|
accessing deleted data
|
changing message transfer rate
|
default security elements
|
erase-on-allocate #1
|
erase-on-allocate #2
|
erasing #1
|
erasing #2
|
erasure patterns #1
|
erasure patterns #2
|
high-water marking #1
|
high-water marking #2
|
managing security profiles
|
protecting after file deletion
|
volume protection
|
DISMOUNT command, alarms
|
DOWNGRADE privilege
|
DSE (data security erase)
|
tailoring
|
Dual passwords
|
Dynamic asynchronous connections
|
automatic switching of terminal line
|
connection example
|
manual switching of terminal line
|
passwords for
|
procedure for establishing
|
security
|
switching of terminal line
|
terminating the link
|
verifier
|
Dynamic attribute for identifiers
|