Index
A
Access Control List (ACL)
Activity statistics
DataNode
NameNode
RPC-related processing
sudden system resources change
Advanced encryption standard (AES) algorithms
Amazon Web Services
EMR cluster
Envelope encryption
Identity and Access Management creation
key management infrastructure
key pair creation
management console
S3 bucket creation
security credentials
Amazon Web Services (AWS)
B
Block ciphers
Burrows–Abadi–Needham (BAN) logic
C
check_long_running_procs.sh
check_ssh_faillogin
Commercial-grade encryption algorithms
Cross-authentication
Cryptography
D
Data encryption standard (DES) algorithm
Dfs metrics
Digital signature
Digital Signature Algorithm (DSA)
Distributed system
authentication
authorization
encryption
SQL Server security layers
symmetric keys/certificates
TDE
ERP
monitoring
SQL Server secures data
E
Encryption
algorithms
AES
asymmetric
DES
DSA
DSA vs. RSA
RSA
symmetric algorithm
EMR Cluster
test encryption
applications
digital signature and certificates
hash functions
key exchange
data at rest
definition
Hadoop distribution
KeyStore
special classes
step-by-step implementation
TrustStore
principles
F
Fine-grained authorization
access permissions
Hadoop environment
system analysis
ticket data details
security model implementation
extending ticket data
HDFS permission model
ticket data storage
users and groups
G
Ganglia
architecture
gmetad component
gmond component
gweb component
RRDtool component
configuration and use of
dashboard
HBase monitoring
H
Hadoop architecture
Apache Hadoop YARN
DataNodes
HA NameNode
HDFS (see Hadoop Distributed File System (HDFS))
MapReduce framework
and job processing
aspect of
input key-value
JobTracker
phases
security issues
task attempt
Hadoop daemon
Hadoop Distributed File System (HDFS)
add/remove DataNodes
cluster rebalancing
disk storage
file storage and replication system
Secondary NameNode
client/server model
communication protocols and vulnerabilities
data provenance
data-transfer protocol
enterprise security
existing user credentials and policies
rest, data encryption
threats
unencrypted data,transit
Hadoop logs
analytics
audit logs
correlation
grep command
HDFS audit log
Hive logs
investigators
MapReduce audit log
sed command
to retrieve records
using browser interface
using job names
daemon logs
splunk
time synchronization
Hadoop metrics
activity statistics
data filtering
dfs
jvm
mapred
Metrics2
rpc
to output files
Hadoop monitoring
distributed system
Ganglia (see Ganglia)
Nagios (see Nagios)
simple monitoring system
Hadoop security
data encryption
in transit
rest
HDFS (see HDFS)
issues
Hadoop Stack
common libraries/utilities
components
core modules
HDFS
MapReduce
YARN
Hash functions
HBase monitoring, with Ganglia
ACL
claims data
file permissions
groups
portable operating system interface
process
daemons
Ganglia monitoring system
Kerberos
Nagios
security issue
business cases
HIPAA
Log4j module
Health Information Portability and Accountability Act (HIPAA)
HTTP protocol
certificates
core-site.xml properties
data transfer
shuffle traffic
SSL properties
usage
I
Identity and Access Management (IAM) console
J
Java Cryptography Extension (JCE)
Jvm metrics
K
database
creation
Hadoop, implementation
core-site.xml
DataNode log file
hdfs-site.xml configuration file
mapred principals
map service principals
TaskController class
YARN containerexecutor.cfg
YARN principals
installation and configuration
key facts
Keytab files
principal
realms
service principals
TGT
tickets
Key management infrastructure (KMI)
L
Lightweight Directory Access Protocol (LDAP)
Local monitoring data
Log4j API
appenders
additivity
HDFS audit
Filters
flexibility
framework
layout
DateLayout
HTMLLayout
PatternLayout
Simple Layout
TTCCLayout
XMLLayout
loggers
inheritance
logging levels
reliability
speed
time-consuming process
M
Malicious flaws
logic trigger
prevent infections
rabbit
trap door
Trojan horse
virus
worm
Mapred metrics
Metrics. See Hadoop metrics
Metrics2 system
Monitoring. See Ganglia; Hadoop monitoring; Nagios
Mutual authentication
N
commands and macros
integration with Ganglia
plug-ins
user community
web interface
Needham–Schroeder Symmetric Key Protocol
Non-malicious flaws
buffer
Incomplete mediation
Time-of-Check to Time-of-Use errors
O
Open source authentication
client-server communications
HTTP protocol (see HTTP protocol)
Inter-process communication
remote procedure call
TaskTracker
TCP/IP protocol
Kerberos (see Kerberos)
passphrases
PuTTY (see PuTTY)
security puzzle
P, Q
Program
failure
fault
malicious flaws (see Malicious flaws)
non-malicious flaws (see Non-malicious flaws)
Public key cryptography
PuTTY
advantage
host key
key-based authentication
authorized_keys file
Generate button
private key
RSA key
SSH
spoofing
R
Remote procedure call (RPC)
Rijndael, AES
Rivest-Shamir-Adelman (RSA) algorithm
Role-based authorization
configuration changes
design roles
design rules
design tables
HDFS file permissions
Hive architecture
Kerberos authentication
permission details
Sentry architecture
rules and roles
ticketing system
Rpc metrics
S
Sarbanes-Oxley Act (SOX)
Secret keys
Security engineering
BAN logic
implementation
motivation
relevance
strategy
protocols
psychological aspects of
client certificates/custom-built applications
password scramblers
pretexting
strong password protocols
trusted computing
two-channel authentication
two-phase authentication
requirement
Security monitoring system. See Ganglia; Nagios
show_users
Simple Authentication and Security Layer (SASL)
Software development life cycle (SDLC)
SQL injection
T, U, V
Thread-Time-Category-Context Layout
Ticket Granting Service (TGS)
Ticket Granting Ticket (TGT)
Transparent Database Encryption (TDE)
W, X,Y, Z
Wrapper