HP OpenVMS Systems Documentation

Content starts here

OpenVMS Guide to System Security

Previous Contents Index

Tampering with system files, detecting
    default security elements
    managing security profiles
TASK objects
TCB (trusted computing base)
    file protection
    hardware #1
    hardware #2
    privileges and
    software #1
    software #2
    software not included
Template devices, security elements of
Terminal emulator
Terminal emulators
Terminal lines
    breaking dialup connection
    C2 system restrictions #1
    C2 system restrictions #2
    clearing DECwindows screen
    clearing the screen #1
    clearing the screen #2
    controlling access #1
    controlling access #2
    default security elements
    dialup login
    failing to respond
    hardcopy, disposing of output
    limiting access
    lines for modems, security of
    logout considerations
    modifying security profiles
    requiring a system password
    security alarms and
    session logging
    system password, requirement for
    usage restrictions
    user, in C2 systems
    virtual #1
    virtual #2
    virtual #3
    virtual #4
    virtual #5
    auditing changes to system time
    synchronizing cluster time
Time-of-day login restrictions
Time-stamp, synchronizing in cluster
    synchronizing in cluster
TMPMBX privilege
Training of users, importance to security
Trojan horse programs #1
Trojan horse programs #2
TTY_DEFCHAR2 system parameter
    disabling virtual terminals
    enabling system passwords for remote logins
TTY_TIMEOUT system parameter, setting reconnection time
UAFs (user authorization files)
    auditing modifications to
    enabling auditing through #1
    enabling auditing through #2
    modifications and security audit
    normal protection
    performance impact of enabling auditing
    privileges and #1
    privileges and #2
    record of last login
    synchronization with rights database
UIC groups
    design limitations
    impact on user privileges
UIC identifiers
    deleting when employee leaves
    example #1
    example #2
UICs (user identification codes)
    adding to rights database
    C2 systems and
    changing an object's
    group restrictions
    guidelines for creating
    object access evaluations and
    storage of
    uniqueness requirement for clustered systems
Unshareable devices, access requirements
UPGRADE privilege
Use access
User accounts
    security considerations
User authorization
    account expiration
    login class restrictions
    privilege use
    shift restrictions
User irresponsibility
    as security problem
    training as antidote
User name mapping
User names as identifiers #1
User names as identifiers #2
User penetration as security problem
User probing as security problem
User training
User-written system services
    replacing with protected subsystems
    access through ACEs
    C2 systems and
    displaying process rights identifiers
    displaying rights
    file security and
    granting privileges
    introduction to system
    protection code categories
    requesting access
    security categories of #1
    security categories of #2
    security categories of #3
    security profiles of
    setting default object protection
    trusted #1
    trusted #2
VAXcluster environments
    C2 system restrictions
VAXcluster environments, protected objects
Verification using two passwords
Virtual terminals #1
Virtual terminals #2
    disconnected processes and
    logging out of
Volatile database, network
VOLPRO privilege #1
VOLPRO privilege #2
    access requirements
    as protected objects
    auditing mounts or dismounts
    erasing data
    events audited
        access requirements
    privilege requirements
    profile storage
    reusing in C2 systems
    security elements of
    template profile
    types of access
VT100-series terminals, clearing screen
VT200-series terminals, clearing screen
Weekday login restrictions
Welcome messages
    security disadvantages
Wildcard characters
    in ADD/IDENTIFIER command
    in SHOW/RIGHTS command
Work restrictions
    clearing screen
    default security elements
WORLD privilege
    impact on SHOW PROCESS command
World users (security category) #1
World users (security category) #2
Write access
    files #1
    files #2
    global sections
    granting through ACLs
    granting through protection codes
    logical name tables
    resource domains
    security class

Previous Next Contents Index