| T | 
  
  
    | 
Tampering with system files, detecting
     | 
  
  
    | 
Tapes
     | 
  
  
    | 
    default security elements
     | 
  
  
    | 
    managing security profiles
     | 
  
  
    | 
TASK objects
     | 
  
  
    | 
TCB (trusted computing base)
     | 
  
  
    | 
    file protection
     | 
  
  
    | 
    hardware #1
     | 
  
  
    | 
    hardware #2
     | 
  
  
    | 
    privileges and
     | 
  
  
    | 
    software #1
     | 
  
  
    | 
    software #2
     | 
  
  
    | 
    software not included
     | 
  
  
    | 
Template devices, security elements of
     | 
  
  
    | 
Terminal emulator
     | 
  
  
    | 
Terminal emulators
     | 
  
  
    | 
Terminal lines
     | 
  
  
    | 
Terminals
     | 
  
  
    | 
    breaking dialup connection
     | 
  
  
    | 
    C2 system restrictions #1
     | 
  
  
    | 
    C2 system restrictions #2
     | 
  
  
    | 
    clearing DECwindows screen
     | 
  
  
    | 
    clearing the screen #1
     | 
  
  
    | 
    clearing the screen #2
     | 
  
  
    | 
    controlling access #1
     | 
  
  
    | 
    controlling access #2
     | 
  
  
    | 
    default security elements
     | 
  
  
    | 
    dialup login
     | 
  
  
    | 
    failing to respond
     | 
  
  
    | 
    hardcopy
     | 
  
  
    | 
        disposing of output
     | 
  
  
    | 
    limiting access
     | 
  
  
    | 
    lines for modems, security of
     | 
  
  
    | 
    logout considerations
     | 
  
  
    | 
    modifying security profiles
     | 
  
  
    | 
    port
     | 
  
  
    | 
    requiring a system password
     | 
  
  
    | 
    security alarms and
     | 
  
  
    | 
    session logging
     | 
  
  
    | 
    system password
     | 
  
  
    | 
        requirement for
     | 
  
  
    | 
    usage restrictions
     | 
  
  
    | 
    user, in C2 systems
     | 
  
  
    | 
    virtual #1
     | 
  
  
    | 
    virtual #2
     | 
  
  
    | 
    virtual #3
     | 
  
  
    | 
    virtual #4
     | 
  
  
    | 
    virtual #5
     | 
  
  
    | 
Time
     | 
  
  
    | 
    auditing changes to system time
     | 
  
  
    | 
    synchronizing cluster time
     | 
  
  
    | 
Time-of-day login restrictions
     | 
  
  
    | 
Time-stamp, synchronizing in cluster
     | 
  
  
    | 
Time-stamps
     | 
  
  
    | 
    synchronizing in cluster
     | 
  
  
    | 
TMPMBX privilege
     | 
  
  
    | 
Training of users, importance to security
     | 
  
  
    | 
Trojan horse programs #1
     | 
  
  
    | 
Trojan horse programs #2
     | 
  
  
    | 
TTY_DEFCHAR2 system parameter
     | 
  
  
    | 
    disabling virtual terminals
     | 
  
  
    | 
    enabling system passwords  for remote logins
     | 
  
  
    | 
TTY_TIMEOUT system parameter, setting reconnection time
     | 
  
  
    | U | 
  
  
    | 
UAFs (user authorization files)
     | 
  
  
    | 
    auditing modifications to
     | 
  
  
    | 
    enabling auditing through #1
     | 
  
  
    | 
    enabling auditing through #2
     | 
  
  
    | 
    modifications and security audit
     | 
  
  
    | 
    MODIFY user/FLAG=AUDIT #1
     | 
  
  
    | 
    MODIFY user/FLAG=AUDIT #2
     | 
  
  
    | 
    normal protection
     | 
  
  
    | 
    performance impact of enabling  auditing
     | 
  
  
    | 
    privileges and #1
     | 
  
  
    | 
    privileges and #2
     | 
  
  
    | 
    record of last login
     | 
  
  
    | 
    synchronization with rights database
     | 
  
  
    | 
UIC groups
     | 
  
  
    | 
    design limitations
     | 
  
  
    | 
    designing
     | 
  
  
    | 
    impact on user privileges
     | 
  
  
    | 
UIC identifiers
     | 
  
  
    | 
    deleting when employee leaves
     | 
  
  
    | 
    example #1
     | 
  
  
    | 
    example #2
     | 
  
  
    | 
UICs (user identification codes)
     | 
  
  
    | 
    adding to rights database
     | 
  
  
    | 
    alphanumeric
     | 
  
  
    | 
    C2 systems and
     | 
  
  
    | 
    changing an object's
     | 
  
  
    | 
    format
     | 
  
  
    | 
    group restrictions
     | 
  
  
    | 
    guidelines for creating
     | 
  
  
    | 
    numeric
     | 
  
  
    | 
    object access evaluations and
     | 
  
  
    | 
    process
     | 
  
  
    | 
    storage of
     | 
  
  
    | 
    uniqueness requirement for clustered   systems
     | 
  
  
    | 
    zero
     | 
  
  
    | 
Unshareable devices, access requirements
     | 
  
  
    | 
UPGRADE privilege
     | 
  
  
    | 
Use access
     | 
  
  
    | 
User accounts
     | 
  
  
    | 
    security considerations
     | 
  
  
    | 
User authorization
     | 
  
  
    | 
    account expiration
     | 
  
  
    | 
    login class restrictions
     | 
  
  
    | 
    privilege use
     | 
  
  
    | 
    shift restrictions
     | 
  
  
    | 
User irresponsibility
     | 
  
  
    | 
    as security problem
     | 
  
  
    | 
    training as antidote
     | 
  
  
    | 
User name mapping
     | 
  
  
    | 
User names as identifiers #1
     | 
  
  
    | 
User names as identifiers #2
     | 
  
  
    | 
User penetration as security problem
     | 
  
  
    | 
User probing as security problem
     | 
  
  
    | 
User training
     | 
  
  
    | 
User-written system services
     | 
  
  
    | 
    replacing with protected subsystems
     | 
  
  
    | 
Users
     | 
  
  
    | 
    access through ACEs
     | 
  
  
    | 
    C2 systems and
     | 
  
  
    | 
    displaying process rights identifiers
     | 
  
  
    | 
    displaying rights
     | 
  
  
    | 
    file security and
     | 
  
  
    | 
    granting privileges
     | 
  
  
    | 
    introduction to system
     | 
  
  
    | 
    protection code categories
     | 
  
  
    | 
    requesting access
     | 
  
  
    | 
    security categories of #1
     | 
  
  
    | 
    security categories of #2
     | 
  
  
    | 
    security categories of #3
     | 
  
  
    | 
    security profiles of
     | 
  
  
    | 
    setting default object protection
     | 
  
  
    | 
    training
     | 
  
  
    | 
    trusted #1
     | 
  
  
    | 
    trusted #2
     | 
  
  
    | 
    untrusted
     | 
  
  
    | V | 
  
  
    | 
VAXcluster environments
     | 
  
  
    | 
    C2 system restrictions
     | 
  
  
    | 
    protected objects
     | 
  
  
    | 
Verification using two passwords
     | 
  
  
    | 
Virtual terminals #1
     | 
  
  
    | 
Virtual terminals #2
     | 
  
  
    | 
    disabling
     | 
  
  
    | 
    disconnected processes and
     | 
  
  
    | 
    logging out of
     | 
  
  
    | 
Viruses
     | 
  
  
    | 
VMS$OBJECTS.DAT file
     | 
  
  
    | 
Volatile database
     | 
  
  
    | 
    network
     | 
  
  
    | 
VOLPRO privilege #1
     | 
  
  
    | 
VOLPRO privilege #2
     | 
  
  
    | 
Volumes
     | 
  
  
    | 
    access requirements
     | 
  
  
    | 
    as protected objects
     | 
  
  
    | 
    auditing mounts or dismounts
     | 
  
  
    | 
    erasing data
     | 
  
  
    | 
    events audited
     | 
  
  
    | 
    foreign
     | 
  
  
    | 
        access requirements
     | 
  
  
    | 
    privilege requirements
     | 
  
  
    | 
    profile storage
     | 
  
  
    | 
    protection
     | 
  
  
    | 
    reusing in C2 systems
     | 
  
  
    | 
    security elements of
     | 
  
  
    | 
    template profile
     | 
  
  
    | 
    types of access
     | 
  
  
    | 
VT100-series terminals, clearing screen
     | 
  
  
    | 
VT200-series terminals, clearing screen
     | 
  
  
    | W | 
  
  
    | 
Weekday login restrictions
     | 
  
  
    | 
Welcome messages
     | 
  
  
    | 
    security disadvantages
     | 
  
  
    | 
Wildcard characters
     | 
  
  
    | 
    in ADD/IDENTIFIER command
     | 
  
  
    | 
    in SHOW/RIGHTS command
     | 
  
  
    | 
Work restrictions
     | 
  
  
    | 
Workstations
     | 
  
  
    | 
    clearing screen
     | 
  
  
    | 
    default security elements
     | 
  
  
    | 
WORLD privilege
     | 
  
  
    | 
    impact on SHOW PROCESS command
     | 
  
  
    | 
World users (security category) #1
     | 
  
  
    | 
World users (security category) #2
     | 
  
  
    | 
Write access
     | 
  
  
    | 
    devices
     | 
  
  
    | 
    files #1
     | 
  
  
    | 
    files #2
     | 
  
  
    | 
    global sections
     | 
  
  
    | 
    granting through ACLs
     | 
  
  
    | 
    granting through protection codes
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    resource domains
     | 
  
  
    | 
    security class
     | 
  
  
    | 
    volumes
     |