| Q | 
  
  
    | 
Queues
     | 
  
  
    | 
    access granted by OPER privilege
     | 
  
  
    | 
    ACL access rights
     | 
  
  
    | 
    as protected objects
     | 
  
  
    | 
    events audited
     | 
  
  
    | 
    privilege requirements
     | 
  
  
    | 
    profile storage
     | 
  
  
    | 
    protection code access rights
     | 
  
  
    | 
    security elements of
     | 
  
  
    | 
    template profiles
     | 
  
  
    | 
    types of access
     | 
  
  
    | R | 
  
  
    | 
Read access
     | 
  
  
    | 
    devices
     | 
  
  
    | 
    files
     | 
  
  
    | 
    global sections
     | 
  
  
    | 
    granting through ACLs
     | 
  
  
    | 
    granting through protection codes
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    queues
     | 
  
  
    | 
        through ACLs
     | 
  
  
    | 
        through protection codes
     | 
  
  
    | 
    resource domains
     | 
  
  
    | 
    security class
     | 
  
  
    | 
    volumes
     | 
  
  
    | 
READALL privilege #1
     | 
  
  
    | 
READALL privilege #2
     | 
  
  
    | 
READALL privilege #3
     | 
  
  
    | 
Recall buffers
     | 
  
  
    | 
RECALL command, /ERASE qualifier
     | 
  
  
    | 
Receive passwords
     | 
  
  
    | 
Reconnection to processes
     | 
  
  
    | 
Records displaying holder of a rights identifier
     | 
  
  
    | 
Reference monitors
     | 
  
  
    | 
    applying to networks
     | 
  
  
    | 
    concept in security #1
     | 
  
  
    | 
    concept in security #2
     | 
  
  
    | 
    implementation
     | 
  
  
    | 
    requirements on
     | 
  
  
    | 
Remote diagnostics, C2 system requirements
     | 
  
  
    | 
Remote identifiers
     | 
  
  
    | 
Remote logins
     | 
  
  
    | 
    logging out
     | 
  
  
    | 
    system passwords and
     | 
  
  
    | 
REMOVE/IDENTIFIER command in Authorize utility
     | 
  
  
    | 
Removing proxy access
     | 
  
  
    | 
RENAME command, /INHERIT_SECURITY qualifier
     | 
  
  
    | 
Reserved UIC group numbers
     | 
  
  
    | 
Resource attribute #1
     | 
  
  
    | 
Resource attribute #2
     | 
  
  
    | 
Resource attributes #1
     | 
  
  
    | 
Resource attributes #2
     | 
  
  
    | 
Resource domains
     | 
  
  
    | 
    events audited
     | 
  
  
    | 
    privilege requirements
     | 
  
  
    | 
    profile storage
     | 
  
  
    | 
    security elements of
     | 
  
  
    | 
    template profile
     | 
  
  
    | 
    types of access
     | 
  
  
    | 
Resource identifiers
     | 
  
  
    | 
    as file owners #1
     | 
  
  
    | 
    as file owners #2
     | 
  
  
    | 
Resource monitoring
     | 
  
  
    | 
    disabling
     | 
  
  
    | 
Restricted accounts #1
     | 
  
  
    | 
Restricted accounts #2
     | 
  
  
    | 
    danger of process spawning
     | 
  
  
    | 
    setting up
     | 
  
  
    | 
    when to use #1
     | 
  
  
    | 
    when to use #2
     | 
  
  
    | 
Rights database
     | 
  
  
    | 
    adding identifiers
     | 
  
  
    | 
    assigning identifiers to users
     | 
  
  
    | 
    creating and maintaining
     | 
  
  
    | 
    displaying
     | 
  
  
    | 
    removing identifiers and holders
     | 
  
  
    | 
Rights databases
     | 
  
  
    | 
    adding identifiers
     | 
  
  
    | 
    assigning identifiers to users
     | 
  
  
    | 
    creating and maintaining
     | 
  
  
    | 
    displaying
     | 
  
  
    | 
    removing identifiers and holders
     | 
  
  
    | 
Rights list, access arranged by capability
     | 
  
  
    | 
Rights of users
     | 
  
  
    | 
    displaying
     | 
  
  
    | 
RIGHTSLIST.DAT files
     | 
  
  
    | 
    auditing
     | 
  
  
    | 
    creating and maintaining
     | 
  
  
    | 
    how UICs are stored
     | 
  
  
    | 
RMS_FILEPROT system parameter #1
     | 
  
  
    | 
RMS_FILEPROT system parameter #2
     | 
  
  
    | 
RMS_FILEPROT system parameter #3
     | 
  
  
    | 
RMS_FILEPROT system parameter #4
     | 
  
  
    | 
Routing initialization passwords
     | 
  
  
    | S | 
  
  
    | 
Save set (BACKUP), protection of
     | 
  
  
    | 
Screen clearing #1
     | 
  
  
    | 
Screen clearing #2
     | 
  
  
    | 
Secondary passwords
     | 
  
  
    | 
    advantages
     | 
  
  
    | 
    changing
     | 
  
  
    | 
    changing expired
     | 
  
  
    | 
    disadvantages
     | 
  
  
    | 
    entering
     | 
  
  
    | 
    login expiration
     | 
  
  
    | 
    managing
     | 
  
  
    | 
    minimum length
     | 
  
  
    | 
SECSRV$CLIENT
     | 
  
  
    | 
    reserved identifier
     | 
  
  
    | 
SECSRV$COMMUNICATION
     | 
  
  
    | 
    reserved identifier
     | 
  
  
    | 
SECSRV$OBJECT
     | 
  
  
    | 
    reserved identifier
     | 
  
  
    | 
Secure terminal servers
     | 
  
  
    | 
    password protection and
     | 
  
  
    | 
Security
     | 
  
  
    | 
    environmental factors
     | 
  
  
    | 
Security administrators
     | 
  
  
    | 
    C2 requirements
     | 
  
  
    | 
    checklist for maintaining a secure  system
     | 
  
  
    | 
    cluster managers and
     | 
  
  
    | 
    goals of
     | 
  
  
    | 
    personal accounts
     | 
  
  
    | 
    privilege requirements
     | 
  
  
    | 
    role of
     | 
  
  
    | 
    system passwords and
     | 
  
  
    | 
    training users #1
     | 
  
  
    | 
    training users #2
     | 
  
  
    | 
Security alarms
     | 
  
  
    | 
    audit log file
     | 
  
  
    | 
    disabling on system consoles
     | 
  
  
    | 
    events to enable as #1
     | 
  
  
    | 
    events to enable as #2
     | 
  
  
    | 
    events triggering
     | 
  
  
    | 
    example of enabling events
     | 
  
  
    | 
    sample messages #1
     | 
  
  
    | 
    sample messages #2
     | 
  
  
    | 
Security archive files
     | 
  
  
    | 
    losing the remote link to
     | 
  
  
    | 
Security attacks, forms of #1
     | 
  
  
    | 
Security attacks, forms of #2
     | 
  
  
    | 
Security audit event messages
     | 
  
  
    | 
    changing disk transfer rate
     | 
  
  
    | 
    controlling delivery to server
     | 
  
  
    | 
    delaying delivery at startup
     | 
  
  
    | 
    when to ignore
     | 
  
  
    | 
SECURITY.AUDIT$JOURNAL files
     | 
  
  
    | 
Security audit log files #1
     | 
  
  
    | 
Security audit log files #2
     | 
  
  
    | 
    advantages of
     | 
  
  
    | 
    allocating disk space
     | 
  
  
    | 
    C2 systems and
     | 
  
  
    | 
    changing location
     | 
  
  
    | 
    changing message transfer rate
     | 
  
  
    | 
    characteristics
     | 
  
  
    | 
    creating
     | 
  
  
    | 
    description
     | 
  
  
    | 
    events to report
     | 
  
  
    | 
    interactive analysis
     | 
  
  
    | 
    maintaining
     | 
  
  
    | 
    pre-extending
     | 
  
  
    | 
    procedures
     | 
  
  
    | 
    selecting records from
     | 
  
  
    | 
Security audit reports
     | 
  
  
    | 
    analyzing suspicious activity
     | 
  
  
    | 
    brief format
     | 
  
  
    | 
    creating
     | 
  
  
    | 
    defining contents of #1
     | 
  
  
    | 
    defining contents of #2
     | 
  
  
    | 
    destination
     | 
  
  
    | 
    detailed inspection
     | 
  
  
    | 
    examples #1
     | 
  
  
    | 
    examples #2
     | 
  
  
    | 
    formats #1
     | 
  
  
    | 
    formats #2
     | 
  
  
    | 
    full format
     | 
  
  
    | 
    rights identifiers in
     | 
  
  
    | 
    routine inspections
     | 
  
  
    | 
    scheduling
     | 
  
  
    | 
    summary format
     | 
  
  
    | 
Security auditing
     | 
  
  
    | 
    account and file access
     | 
  
  
    | 
    adding ACEs to files
     | 
  
  
    | 
    analyzing audit log files
     | 
  
  
    | 
    archive files
     | 
  
  
    | 
    assessing site requirements
     | 
  
  
    | 
    audit server databases
     | 
  
  
    | 
    audit trails #1
     | 
  
  
    | 
    audit trails #2
     | 
  
  
    | 
    C2 system restrictions
     | 
  
  
    | 
    capability objects
     | 
  
  
    | 
    cluster considerations
     | 
  
  
    | 
    common event flag clusters
     | 
  
  
    | 
    controlling event messages
     | 
  
  
    | 
    default auditing events
     | 
  
  
    | 
    default characteristics
     | 
  
  
    | 
    devices
     | 
  
  
    | 
    directories
     | 
  
  
    | 
    disabling auditing
     | 
  
  
    | 
    disabling events
     | 
  
  
    | 
    disabling resource monitoring
     | 
  
  
    | 
    effective use
     | 
  
  
    | 
    enabling auditing
     | 
  
  
    | 
    enabling event classes
     | 
  
  
    | 
    enabling events
     | 
  
  
    | 
    error handling #1
     | 
  
  
    | 
    error handling #2
     | 
  
  
    | 
    excluding processes from suspension
     | 
  
  
    | 
    files #1
     | 
  
  
    | 
    files #2
     | 
  
  
    | 
    global sections
     | 
  
  
    | 
    granularity of events
     | 
  
  
    | 
    high security needs #1
     | 
  
  
    | 
    high security needs #2
     | 
  
  
    | 
    listener devices
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    low security needs #1
     | 
  
  
    | 
    low security needs #2
     | 
  
  
    | 
    managing the audit server
     | 
  
  
    | 
    memory limitations and
     | 
  
  
    | 
    messages
     | 
  
  
    | 
    moderate security needs #1
     | 
  
  
    | 
    moderate security needs #2
     | 
  
  
    | 
    moderate security needs #3
     | 
  
  
    | 
    object class enabled
     | 
  
  
    | 
    overview
     | 
  
  
    | 
    performance impact
     | 
  
  
    | 
    queues
     | 
  
  
    | 
    reporting object access
     | 
  
  
    | 
    reporting object use
     | 
  
  
    | 
    resource domains
     | 
  
  
    | 
    security class objects
     | 
  
  
    | 
    sending event messages to archive files #1
     | 
  
  
    | 
    sending event messages to archive files #2
     | 
  
  
    | 
    sending event messages to mailboxes
     | 
  
  
    | 
    sending event messages to operator terminals
     | 
  
  
    | 
    synchronizing cluster time
     | 
  
  
    | 
    volumes
     | 
  
  
    | 
Security-auditing ACEs
     | 
  
  
    | 
    position in ACL
     | 
  
  
    | 
Security-auditing events
     | 
  
  
    | 
    based on security needs
     | 
  
  
    | 
    classes of
     | 
  
  
    | 
    default classes #1
     | 
  
  
    | 
    default classes #2
     | 
  
  
    | 
    default classes #3
     | 
  
  
    | 
    disabling all classes
     | 
  
  
    | 
    displaying
     | 
  
  
    | 
    enabling all classes
     | 
  
  
    | 
    enabling as alarms
     | 
  
  
    | 
    enabling as audits
     | 
  
  
    | 
    example
     | 
  
  
    | 
    network
     | 
  
  
    | 
    reporting #1
     | 
  
  
    | 
    reporting #2
     | 
  
  
    | 
    reporting #3
     | 
  
  
    | 
    reporting #4
     | 
  
  
    | 
    sending to audit log files
     | 
  
  
    | 
    sending to listener mailboxes
     | 
  
  
    | 
    sending to operator terminals
     | 
  
  
    | 
    sending to remote archive files
     | 
  
  
    | 
    suppressing privilege audits
     | 
  
  
    | 
    suppressing process control audits
     | 
  
  
    | 
    system services for
     | 
  
  
    | 
Security breaches, handling #1
     | 
  
  
    | 
Security breaches, handling #2
     | 
  
  
    | 
Security checklists
     | 
  
  
    | 
    for C2 systems
     | 
  
  
    | 
    for designing a secure system
     | 
  
  
    | 
    for maintaining a secure system
     | 
  
  
    | 
    for training users
     | 
  
  
    | 
    for users
     | 
  
  
    | 
Security class object
     | 
  
  
    | 
    definition
     | 
  
  
    | 
    events audited
     | 
  
  
    | 
    profile storage
     | 
  
  
    | 
    template profile
     | 
  
  
    | 
    types of access
     | 
  
  
    | 
Security features
     | 
  
  
    | 
    access controls #1
     | 
  
  
    | 
    access controls #2
     | 
  
  
    | 
    account duration #1
     | 
  
  
    | 
    account duration #2
     | 
  
  
    | 
    account duration #3
     | 
  
  
    | 
    auditing #1
     | 
  
  
    | 
    auditing #2
     | 
  
  
    | 
    auditing #3
     | 
  
  
    | 
    auditing #4
     | 
  
  
    | 
    automatic password generation #1
     | 
  
  
    | 
    automatic password generation #2
     | 
  
  
    | 
    dialup retries
     | 
  
  
    | 
    erase-on-allocate
     | 
  
  
    | 
    erase-on-delete
     | 
  
  
    | 
    high-water marking
     | 
  
  
    | 
    intrusion detection #1
     | 
  
  
    | 
    intrusion detection #2
     | 
  
  
    | 
    login class restrictions #1
     | 
  
  
    | 
    login class restrictions #2
     | 
  
  
    | 
    password changes
     | 
  
  
    | 
    password expiration #1
     | 
  
  
    | 
    password expiration #2
     | 
  
  
    | 
    password protection #1
     | 
  
  
    | 
    password protection #2
     | 
  
  
    | 
    password requirements #1
     | 
  
  
    | 
    password requirements #2
     | 
  
  
    | 
    password restrictions #1
     | 
  
  
    | 
    password restrictions #2
     | 
  
  
    | 
    passwords
     | 
  
  
    | 
    protected subsystems
     | 
  
  
    | 
    proxy accounts
     | 
  
  
    | 
    proxy logins #1
     | 
  
  
    | 
    proxy logins #2
     | 
  
  
    | 
    secondary passwords #1
     | 
  
  
    | 
    secondary passwords #2
     | 
  
  
    | 
    secure terminal servers #1
     | 
  
  
    | 
    secure terminal servers #2
     | 
  
  
    | 
    security alarms
     | 
  
  
    | 
    shift restrictions
     | 
  
  
    | 
    system passwords #1
     | 
  
  
    | 
    system passwords #2
     | 
  
  
    | 
Security kernel, definition
     | 
  
  
    | 
Security levels #1
     | 
  
  
    | 
Security levels #2
     | 
  
  
    | 
    event monitoring and
     | 
  
  
    | 
    high #1
     | 
  
  
    | 
    high #2
     | 
  
  
    | 
    low #1
     | 
  
  
    | 
    low #2
     | 
  
  
    | 
    medium
     | 
  
  
    | 
Security management
     | 
  
  
    | 
    for clusters #1
     | 
  
  
    | 
    for clusters #2
     | 
  
  
    | 
    for clusters #3
     | 
  
  
    | 
    managing audit log file
     | 
  
  
    | 
    modifying cluster group number
     | 
  
  
    | 
    modifying cluster password
     | 
  
  
    | 
    policy development #1
     | 
  
  
    | 
    policy development #2
     | 
  
  
    | 
    policy development #3
     | 
  
  
    | 
    protected objects, cluster-visible
     | 
  
  
    | 
    protected objects, databases
     | 
  
  
    | 
    synchronizing authorization data
     | 
  
  
    | 
    SYSMAN requirements
     | 
  
  
    | 
Security models
     | 
  
  
    | 
Security operator terminals
     | 
  
  
    | 
SECURITY privilege
     | 
  
  
    | 
    hidden ACEs and
     | 
  
  
    | 
Security problems
     | 
  
  
    | 
    anonymity of network and dialup users
     | 
  
  
    | 
    autologin accounts, reducing
     | 
  
  
    | 
    categories of
     | 
  
  
    | 
    disk scavenging
     | 
  
  
    | 
    hardcopy terminal output
     | 
  
  
    | 
    logging out #1
     | 
  
  
    | 
    logging out #2
     | 
  
  
    | 
    network access control strings
     | 
  
  
    | 
    password detection
     | 
  
  
    | 
    telephone system as
     | 
  
  
    | 
Security profiles
     | 
  
  
    | 
    assigning to new devices
     | 
  
  
    | 
    capability object
     | 
  
  
    | 
    common event flag clusters
     | 
  
  
    | 
    devices
     | 
  
  
    | 
    displaying class defaults
     | 
  
  
    | 
    files #1
     | 
  
  
    | 
    files #2
     | 
  
  
    | 
    files #3
     | 
  
  
    | 
    global sections
     | 
  
  
    | 
    in access evaluations
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    modification requirements #1
     | 
  
  
    | 
    modification requirements #2
     | 
  
  
    | 
    objects
     | 
  
  
    | 
        ACLs
     | 
  
  
    | 
        changing
     | 
  
  
    | 
        contents
     | 
  
  
    | 
        deleting ACLs
     | 
  
  
    | 
        displaying
     | 
  
  
    | 
        modifying class templates
     | 
  
  
    | 
        origin of
     | 
  
  
    | 
        owner element
     | 
  
  
    | 
        protection codes #1
     | 
  
  
    | 
        protection codes #2
     | 
  
  
    | 
    processes
     | 
  
  
    | 
        displaying #1
     | 
  
  
    | 
        displaying #2
     | 
  
  
    | 
        identifiers
     | 
  
  
    | 
        privileges
     | 
  
  
    | 
        UICs
     | 
  
  
    | 
    queues
     | 
  
  
    | 
    resource domains
     | 
  
  
    | 
    security class
     | 
  
  
    | 
    users
     | 
  
  
    | 
        displaying #1
     | 
  
  
    | 
        displaying #2
     | 
  
  
    | 
        identifiers
     | 
  
  
    | 
        privileges
     | 
  
  
    | 
        UICs #1
     | 
  
  
    | 
        UICs #2
     | 
  
  
    | 
    volumes
     | 
  
  
    | 
Security restrictions
     | 
  
  
    | 
    captive command procedures
     | 
  
  
    | 
    login class
     | 
  
  
    | 
    on command usage
     | 
  
  
    | 
    on mode of operation
     | 
  
  
    | 
    shifts #1
     | 
  
  
    | 
    shifts #2
     | 
  
  
    | 
    time-of-day #1
     | 
  
  
    | 
    time-of-day #2
     | 
  
  
    | 
Security Server process
     | 
  
  
    | 
SECURITY_POLICY system parameter #1
     | 
  
  
    | 
SECURITY_POLICY system parameter #2
     | 
  
  
    | 
Servers
     | 
  
  
    | 
    audit
     | 
  
  
    | 
    secure terminals
     | 
  
  
    | 
    security
     | 
  
  
    | 
SET AUDIT command
     | 
  
  
    | 
    alarms
     | 
  
  
    | 
    enabling security-relevant events
     | 
  
  
    | 
    /EXCLUDE qualifier
     | 
  
  
    | 
    /INTERVAL qualifier
     | 
  
  
    | 
    /LISTENER qualifier
     | 
  
  
    | 
    opening new log files
     | 
  
  
    | 
    /SERVER qualifier #1
     | 
  
  
    | 
    /SERVER qualifier #2
     | 
  
  
    | 
    suggested auditing applications
     | 
  
  
    | 
    /THRESHOLD qualifier
     | 
  
  
    | 
SET FILE command, /ERASE qualifier
     | 
  
  
    | 
SET HOST command
     | 
  
  
    | 
SET HOST/DTE command, using over the network
     | 
  
  
    | 
SET PASSWORD command
     | 
  
  
    | 
    automatic password generation
     | 
  
  
    | 
    /GENERATE qualifier #1
     | 
  
  
    | 
    /GENERATE qualifier #2
     | 
  
  
    | 
    /SECONDARY qualifier
     | 
  
  
    | 
    /SYSTEM/GENERATE qualifier
     | 
  
  
    | 
    /SYSTEM qualifier
     | 
  
  
    | 
SET PROCESS command, /PRIVILEGES qualifier #1
     | 
  
  
    | 
SET PROCESS command, /PRIVILEGES qualifier #2
     | 
  
  
    | 
SET PROTECTION/DEFAULT command
     | 
  
  
    | 
SET SECURITY command
     | 
  
  
    | 
    /ACL qualifier
     | 
  
  
    | 
        adding Identifier ACEs
     | 
  
  
    | 
        deleting
     | 
  
  
    | 
        deleting ACEs
     | 
  
  
    | 
        example
     | 
  
  
    | 
        replacing ACEs
     | 
  
  
    | 
    /AFTER qualifier
     | 
  
  
    | 
    changing object security profile
     | 
  
  
    | 
    changing protection codes
     | 
  
  
    | 
    /CLASS=DEVICE qualifier
     | 
  
  
    | 
    /CLASS qualifier #1
     | 
  
  
    | 
    /CLASS qualifier #2
     | 
  
  
    | 
    copying ACLs
     | 
  
  
    | 
    /COPY_ATTRIBUTE qualifier
     | 
  
  
    | 
    creating an ACL
     | 
  
  
    | 
    /DEFAULT qualifier #1
     | 
  
  
    | 
    /DEFAULT qualifier #2
     | 
  
  
    | 
    /DELETE qualifier
     | 
  
  
    | 
    deleting ACEs
     | 
  
  
    | 
    example
     | 
  
  
    | 
    /LIKE qualifier
     | 
  
  
    | 
    managing site defaults
     | 
  
  
    | 
    /OWNER qualifier
     | 
  
  
    | 
    /PROTECTION qualifier #1
     | 
  
  
    | 
    /PROTECTION qualifier #2
     | 
  
  
    | 
        modifying codes
     | 
  
  
    | 
        modifying for devices
     | 
  
  
    | 
    /REPLACE qualifier
     | 
  
  
    | 
    restoring defaults for files
     | 
  
  
    | 
    setting default file protection
     | 
  
  
    | 
SET TERMINAL command
     | 
  
  
    | 
    /DISCONNECT qualifier
     | 
  
  
    | 
    /HANGUP qualifier
     | 
  
  
    | 
    /NOMODEM/SECURE qualifier
     | 
  
  
    | 
    /SECURE qualifier
     | 
  
  
    | 
    stopping password  grabbers
     | 
  
  
    | 
    /SYSPWD qualifier
     | 
  
  
    | 
    using over the network
     | 
  
  
    | 
Set-Up key
     | 
  
  
    | 
SET VOLUME command
     | 
  
  
    | 
    /ERASE_ON_DELETE qualifier
     | 
  
  
    | 
    /NOHIGHWATER_MARKING qualifier #1
     | 
  
  
    | 
    /NOHIGHWATER_MARKING qualifier #2
     | 
  
  
    | 
    /PROTECTION qualifier
     | 
  
  
    | 
SET VOLUME command, /ERASE_ON_DELETE qualifier
     | 
  
  
    | 
SETPRV privilege
     | 
  
  
    | 
SHARE privilege
     | 
  
  
    | 
Shareable devices, access requirements
     | 
  
  
    | 
Shared files,  considerations for a cluster system
     | 
  
  
    | 
Shift restrictions
     | 
  
  
    | 
SHMEM privilege
     | 
  
  
    | 
SHOW AUDIT command #1
     | 
  
  
    | 
SHOW AUDIT command #2
     | 
  
  
    | 
SHOW/IDENTIFIER command in Authorize utility #1
     | 
  
  
    | 
SHOW/IDENTIFIER command in Authorize utility #2
     | 
  
  
    | 
SHOW INTRUSION command
     | 
  
  
    | 
SHOW PROCESS command
     | 
  
  
    | 
    and WORLD privilege
     | 
  
  
    | 
SHOW PROTECTION command
     | 
  
  
    | 
SHOW/RIGHTS command in Authorize utility
     | 
  
  
    | 
SHOW SECURITY command
     | 
  
  
    | 
    displaying security profiles of objects
     | 
  
  
    | 
    displaying site defaults #1
     | 
  
  
    | 
    displaying site defaults #2
     | 
  
  
    | 
    displaying the object's class
     | 
  
  
    | 
SHOW USERS command, disconnected jobs and
     | 
  
  
    | 
Sign-on
     | 
  
  
    | 
    single
     | 
  
  
    | 
Single sign-on
     | 
  
  
    | 
Site security
     | 
  
  
    | 
Social engineering as security problem
     | 
  
  
    | 
SOGW user category abbreviation
     | 
  
  
    | 
Spawning processes, security implications in restricted accounts
     | 
  
  
    | 
Spooled devices, access requirements
     | 
  
  
    | 
STARTNET.COM command procedure
     | 
  
  
    | 
STARTUP_P1 system parameter
     | 
  
  
    | 
Subjects in security models #1
     | 
  
  
    | 
Subjects in security models #2
     | 
  
  
    | 
Submit access
     | 
  
  
    | 
Subprocesses
     | 
  
  
    | 
    analyzing audit messages
     | 
  
  
    | 
    increase in auditing events
     | 
  
  
    | 
subsystem ACEs #1
     | 
  
  
    | 
subsystem ACEs #2
     | 
  
  
    | 
subsystem ACEs #3
     | 
  
  
    | 
subsystem ACEs #4
     | 
  
  
    | 
    format
     | 
  
  
    | 
Subsystem attribute
     | 
  
  
    | 
Surveillance guidelines
     | 
  
  
    | 
Synchronization
     | 
  
  
    | 
    password
     | 
  
  
    | 
SYS$ACME_MODULE logical name
     | 
  
  
    | 
SYS$ANNOUNCE logical name
     | 
  
  
    | 
SYS$NODE logical name
     | 
  
  
    | 
SYS$SINGLE_SIGNON logical name
     | 
  
  
    | 
SYS$SINGLE_SIGNON logical name bits
     | 
  
  
    | 
SYS$WELCOME logical name
     | 
  
  
    | 
SYSALF, automatic login facility (ALF) file
     | 
  
  
    | 
SYSECURITY.COM command procedure
     | 
  
  
    | 
SYSGBL privilege #1
     | 
  
  
    | 
SYSGBL privilege #2
     | 
  
  
    | 
SYSLCK privilege #1
     | 
  
  
    | 
SYSLCK privilege #2
     | 
  
  
    | 
SYSMAN databases and C2 environments
     | 
  
  
    | 
SYSNAM privilege #1
     | 
  
  
    | 
SYSNAM privilege #2
     | 
  
  
    | 
    modifying system operations
     | 
  
  
    | 
    overriding access controls
     | 
  
  
    | 
    queue management
     | 
  
  
    | 
SYSPRV privilege #1
     | 
  
  
    | 
SYSPRV privilege #2
     | 
  
  
    | 
SYSPRV privilege #3
     | 
  
  
    | 
    giving rights of system user
     | 
  
  
    | 
    tasks requiring
     | 
  
  
    | 
SYSTARTUP_VMS.COM command procedure
     | 
  
  
    | 
System failures
     | 
  
  
    | 
    disposing of hardcopy output
     | 
  
  
    | 
System files
     | 
  
  
    | 
    adding ACLs
     | 
  
  
    | 
    Alpha default protection
     | 
  
  
    | 
    auditing recommendations
     | 
  
  
    | 
    benefiting from ACLs
     | 
  
  
    | 
    default protection
     | 
  
  
    | 
    protecting
     | 
  
  
    | 
    protection codes and ownership
     | 
  
  
    | 
    recommended
     | 
  
  
    | 
    required
     | 
  
  
    | 
    VAX default protection
     | 
  
  
    | 
System Generation utility (SYSGEN), auditing parameter  modifications
     | 
  
  
    | 
System Management utility (SYSMAN)
     | 
  
  
    | 
    managing clusters
     | 
  
  
    | 
    modifying cluster security data
     | 
  
  
    | 
    modifying LGI parameters
     | 
  
  
    | 
System parameters
     | 
  
  
    | 
    auditing modification of
     | 
  
  
    | 
    controlling disconnected processes
     | 
  
  
    | 
    defining system users (security category)
     | 
  
  
    | 
    required C2 settings
     | 
  
  
    | 
System passwords
     | 
  
  
    | 
    causing login failures
     | 
  
  
    | 
    disadvantages
     | 
  
  
    | 
    entering
     | 
  
  
    | 
    guidelines
     | 
  
  
    | 
    minimum length requirement
     | 
  
  
    | 
    modifying
     | 
  
  
    | 
    recommended change frequency
     | 
  
  
    | 
    setting up
     | 
  
  
    | 
    where stored
     | 
  
  
    | 
System services, auditing event information
     | 
  
  
    | 
System users (security category) #1
     | 
  
  
    | 
System users (security category) #2
     | 
  
  
    | 
    defining with MAXSYSGROUP parameter
     | 
  
  
    | 
    qualifications for
     | 
  
  
    | 
Systems
     | 
  
  
    | 
    controlling access to
     | 
  
  
    | 
    controlling use of
     | 
  
  
    | 
SYSUAF.DAT files
     | 
  
  
    | 
    account expiration
     | 
  
  
    | 
    auditing modifications to
     | 
  
  
    | 
    LOCKPWD flag
     | 
  
  
    | 
    login class restrictions
     | 
  
  
    | 
    modifications and security audit #1
     | 
  
  
    | 
    modifications and security audit #2
     | 
  
  
    | 
    normal protection
     | 
  
  
    | 
    password storage
     | 
  
  
    | 
    privileges and #1
     | 
  
  
    | 
    privileges and #2
     | 
  
  
    | 
    recording privileges
     | 
  
  
    | 
    synchronization with rights database
     | 
  
  
    | 
SYSUAFs (system user authorization files)
     | 
  
  
    | 
    marking for external authentication
     |