Daftar perusahaan yang berhubungan dengan keamanan

Daftar perusahaan yang berhubungan dengan keamanan

1. Data Fellows http://www.datafellows.com/ Menyediakan SSH (secure shell), server dan client, untuk sistem UNIX dan Windows. Juga menyediakan proteksi virus.

2. PGP Internasional http://www.pgpi.com Menyediakan implementasi PGP versi internasional (yang dapat digunakan di luar Amerika Serikat).

3. Secure Networks http://www.securenetworks.com

Sumber software / tools

1. Apache-SSL: versi web server Apache yang menggunakan SSL http://www.apache-ssl.org

2. Auditd: monitor and log system calls dari HERT ftp://ftp.hert.org/pub/linux/auditd

3. Autobuse: identifikasi abuse dengan memonitor logfile http://www.picante.com/~gtaylor/autobuse

4. Fwconfig: front end tool untuk ipfwadm http://www.mindstorm.com/~sparlin/fwconfig.shtml

5. GnuPG, GNU Privacy Guard http://www.d.shuttle.de/isil/gnupg

6. icmpush: send arbitrary ICMP packet http://hispahack.ccc.de

7. ipchains: Linux kernel packet filtering yang baru, yang akan mengganti- kan ipfwadm http:// www.rustcorp.com/linux/ipchains

8. ipfwadm: Linux kernel packet filtering yang lama http://www.xos.nl/linux/ipfwadm

Keamanan Sistem Informasi Berbasis Internet - Budi Rahardjo

Referensi

9. IPlog: berisi iplog, icmplog, udplog http://www.ojnk.org/~eric

10. Karpski, network monitor berbasis GTK+ http://mojo.calyx.net/~bxx/karpski.html

11. Ksniff http://www.mtco.com/~whoop/ksniff/ksniff.html

12. libpcap: library untuk menangkap (capture) packet ftp://ftp.ee.lbl.gov/libpcap.tar.Z

13. Nessus: security auditing tools (Linux) http://www.nessus.org

14. netwatch: monitor network, text-mode

15. nmap (UNIX): probing, OS fingerprinting http://www.insecure.org/nmap/ http://www.dhp.com/~fyodor/nmap

16. ntop: memantau penggunaan jaringan http://jake.unipi.it/~deri/ntop/

17. OpenSec: koleksi tools http://www.opensec.net

18. OpenSSH: Implementasi SSH terbuka http://www.openssh.org

19. OpenSSL: Open Source toolkit SSL v2/v3 dan Transport Layer Security (TLS v1) http://www.openssl.org

20. queso: OS fingerprinting http://www.apostols.org/projectz/

21. Retina: scanning Windows NT http://www.eeye.com

22. Saint http://www.wdsi.com/saint/

23. SBScan http://www.haqd.demon.co.uk/security.htm

24. Shadow: intrusion detection system dari SANS http://www.sans.org

Keamanan Sistem Informasi Berbasis Internet - Budi Rahardjo

Sumber software / tools

25. SING: send arbitrary ICMP (including garbage) http://sourceforge.net/projects/sing

26. SSLeay: free SSL crypto library & applications http://www.ssleay.org

27. snort (UNIX), packet logger, IDS http://www.snort.org

28. Socks, proxy server http://www.socks.nec.com

29. Squid: web proxy server http://squid. nlanr.net

30. tcpdump: popular packet capture (dump) untuk sistem UNIX, harus memiliki libpcap yang dapat diperoleh dari tempat yang sama ftp://ftp.lbl.ee.gov

31. TCP wrapper (UNIX), official site ftp://ftp.porcupine.org/pub/security/

32. tcplogd: memantau adanya probing http://www.kalug.lug.net

33. Trinux (Linux) http://www.trinux.org

Keamanan Sistem Informasi Berbasis Internet - Budi Rahardjo

Referensi

Keamanan Sistem Informasi Berbasis Internet - Budi Rahardjo

Symbols

.htaccess 77 /etc/aliases 46 /etc/hosts.allow 64

/etc/hosts.deny 64 /etc/inetd.conf 48, 63, 64 /etc/passw 44

/etc/passwd 61 /etc/services 48 /etc/shadow 62

/etc/utmp 46 /var/adm 68 /var/adm/auth.log 68

/var/adm/daemon.log 68 /var/adm/mail.log 68 /var/adm/syslog 68

/var/lo 68

airport 8 attack 67 Audit 68 Authentication 16 Availability 17

Back Orifice 96 Ballista 47 BIND 68

block cipher 29 bugtraq 88

Caesar Cipher 31 CERT 70

CGI 79 cipher 28 ciphertext 28 Code Red 7 Cops 47 courtney 54 crack 47, 61 cracker 22 Cryptanalysis 28 Cryptanalyst 28 cryptography 28

CVE 117 Cyberkit 53 Cyberlaw 101, 107

Data Encryption Standard 37 decryption 28 Denial of Service 89 denial of service attack 8 DES 37 dig 86 DoS 89

EDI 11 electronic commerce 11

encipher 28 encryption 28 Enigma 35 Enkripsi 28

Fabrication 19 fingerprinting 45

FIPS PUB46 38 Firewall 64

GECOS 61

hacker 22 Hackerlink 25 health care 15 Health Insurance Portability and

Accountability Act 15, 105 host 84

ICMP 95 IDCERT 25 IDEA 72 IIS 88 IMAP 68, 70 imapd 70 Integrity 16

Interception 19 Playfair 34 Interruption 18

POP 68 intruder 67

POP3 48 IP spoofing 44

portsentry 54 ipchains 66, 119

Privacy 14 ipfwadm 66, 119

Public Key Partners 104 iplog 120 iptraf 57

ISO 7498-2 28 queso 45, 55, 120

KR

Kecoa Elektronik 25 RISK 118 key escrow 105

Rootshell 47 klikBCA 17

ROT13 31 RSA 72, 78, 103, 104

land 47, 89

latierra 47, 90 Sam Spade 86 libpcap 120

SANS 118 Linux Debian 64, 68

SBScan 47, 120 Secure Socket Layer 78

sendmail 8, 68 MD5 41

setuid 46 Modification 19

SHA 41 Morris 8

Shadow 120 SirCam 7

smart card 17 NetBus 98

SMTP 48 netdiag 57

smurf 91 NetLab 53

sniffer 15, 56 netwatch 57

Sniffit 93 nmap 45, 55, 120

sniffit 56 ntop 57, 120

SNMP 56 Socks 66

Squid 66, 121 Ogre 53, 79

SSH 72 OpenSSL 78, 120

SSL 78 SSLeay 79, 120

Stallings 18 password 60

Statistik Sistem Keamanan 5 Password, shadow 62

stream cipher 29 pau-mikro 25

strobe 52 Perl 32

Stronghold 78 PGP 36

SunOS 64 ping-o-death 47

syslog 54, 68 plaintext 28

TW

tcpd 64 WebXRay 56 tcpdump 56, 93

whois 85 tcplogd 54, 121

Windows 95 89 tcpprobe 52

windump 93 tcpwrapper 64

winuke 47 tftp 88

Wordstar 12 TLS 120

wu-ftpd 69 trafshow 57 Tripwire 47, 67

Trojan Horse 95 zone transfer 86 trojan horse 16