domingo, agosto 05, 2012

,

LINX Traceability Best Practice Document

Achei o conteúdo Muito produtivo mesmo sendo antigo: " Version 1.0, Last modified 18th May, 1999 " O conteudo original é da  ( Internet Crime Forum - http://www.internetcrimeforum.org.uk/ ) fonte: LINX Traceability Best Practice Document  ;       
CONTENTS
  1. Introduction
  2. Disclaimers
  3. Overview
  4. IP Addresses
  5. 4.1 Source addresses are usually valid 4.2 Source address spoofing 4.3 Source routed packets
  6. Locating the machine
    5.1 Registries
    5.2 Reverse DNS
    5.2 Traceroute
    5.4 Access controls
  7. Identifying the machine
    6.1 Shared IP addresses
    6.1 Dialup access
  8. Identifying dial up accounts
    7.1 Identifying accounts from login and logout records
    7.2 Other identification techniques
    7.3 Final remarks on identifying dialup accounts
  9. Ownership of accounts
    8.1 The ident protocol
    8.2 Ownership
    8.3 Password identification
    8.4 Anonymous accounts
  10. Identifying users
  11. 9.1 User identification technique - name and address 9.2 User identification technique - credit card check 9.3 User identification technique - telephone call back 9.4 User identification technique - client certificates 9.5 "Free" services
  12. Caller line identification
  13. 10.1 Types of CLI 10.2 Recording of CLI 10.3 Using CLI to prevent anonymous access
  14. Logging and audit trails
  15. 11.1 Ageing and archiving 11.2 Data protection requirements 11.3 Other information
  16. Domain Name System
  17. Security
  18. 13.1 Use secure software 13.2 Restrict access to machines 13.3 Correct staff account handling 13.4 Testing the system
  19. Email traceability
  20. 14.1 Why traceability is important 14.2 The "Received" header in email 14.3 Fixing email systems to provide tracing information
  21. Usenet traceability
  22. 15.1 News article headers 15.2 Mail-to-news gateways
  23. Chat Services
  24. 16.1 Internet Relay Chat (IRC)
Forte abraço []'s 

0 comentários:

Postar um comentário