]> git.llucax.com Git - z.facultad/78.01/practicos.git/blob - Outline.rtf
7b530c40130695db600d3646c2920e5ee8317901
[z.facultad/78.01/practicos.git] / Outline.rtf
1 {\rtf1\ansi\ansicpg1252\deff0
2 {\fonttbl
3 {\f0\fnil\fcharset0\fprq0\fttruetype Arial;}
4 {\f1\fnil\fcharset0\fprq0\fttruetype NULL;}
5 {\f2\fnil\fcharset0\fprq0\fttruetype Dingbats;}
6 {\f3\fnil\fcharset0\fprq0\fttruetype Symbol;}
7 {\f4\fnil\fcharset0\fprq0\fttruetype Times New Roman;}
8 {\f5\fnil\fcharset0\fprq0\fttruetype Courier New;}
9 {\f6\fnil\fcharset0\fprq0\fttruetype StarSymbol;}}
10 {\colortbl
11 \red0\green0\blue0;
12 \red255\green255\blue255;}
13 {\stylesheet
14 {\*\cs5\sl240\slmult1\f0\fs24 Car\'e1cter de numeraci\'f3n;}
15 {\s22\sl240\slmult1\f0\fs24\sbasedon7 Lista;}
16 {\s24\sl240\slmult1\fi-431\li720\fs24\sbasedon25\snext31 Lower Roman List;}
17 {\s26\sl240\slmult1\tx431\fs24\sbasedon17\snext25 Numbered Heading 1;}
18 {\s27\sl240\slmult1\tx431\fs24\sbasedon18\snext25 Numbered Heading 2;}
19 {\s28\sl240\slmult1\tx431\fs24\sbasedon19\snext25 Numbered Heading 3;}
20 {\*\cs12\sl240\slmult1\fs24\sbasedon25 Endnote Text;}
21 {\*\cs32\sl240\slmult1\f0\fs24 S\'edmbolo de nota final;}
22 {\*\cs40\sl240\slmult1\f6\fs18 Vi\'f1etas;}
23 {\s9\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Diamond List;}
24 {\s29\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Numbered List;}
25 {\s1\sl240\slmult1\f0\fs56\b\sbasedon10\snext7  Encabezado 1;}
26 {\*\cs11\sl240\slmult1\f0\fs20\super Endnote Reference;}
27 {\s6\sl240\slmult1\tx1584\f0\fs24\sbasedon26\snext25 Chapter Heading;}
28 {\s34\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Square List;}
29 {\s8\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Dashed List;}
30 {\s39\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon29\snext31 Upper Roman List;}
31 {\s20\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Heart List;}
32 {\s23\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon29\snext31 Lower Case List;}
33 {\s38\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon29\snext31 Upper Case List;}
34 {\s4\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Bullet List;}
35 {\s16\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Hand List;}
36 {\*\cs15\sl240\slmult1\fs20\sbasedon25 Footnote Text;}
37 {\s17\sl240\slmult1\sb440\sa60\f0\fs34\b\sbasedon25\snext25 Heading 1;}
38 {\s18\sl240\slmult1\sb440\sa60\f0\fs28\b\sbasedon25\snext25 Heading 2;}
39 {\s19\sl240\slmult1\sb440\sa60\f0\fs24\b\sbasedon25\snext25 Heading 3;}
40 {\s36\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Tick List;}
41 {\*\cs25\sl240\slmult1\f4\fs24\lang1024\sbasedon31\snext31 Normal;}
42 {\s7\sl240\slmult1\sa119\f0\fs24\sbasedon31 Cuerpo de texto;}
43 {\s2\sl240\slmult1\li1440\ri1440\sa119\fs24\sbasedon25\snext31 Block Text;}
44 {\s13\sl240\slmult1\sb119\sa119\f0\fs20\i\sbasedon31 Etiqueta;}
45 {\s10\sl240\slmult1\sb240\sa119\f0\fs28\sbasedon31\snext7 Encabezado;}
46 {\s30\sl240\slmult1\f5\fs24\sbasedon25\snext31 Plain Text;}
47 {\s33\sl240\slmult1\tx1584\f0\fs24\sbasedon26\snext25 Section Heading;}
48 {\s21\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Implies List;}
49 {\s3\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Box List;}
50 {\s35\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Star List;}
51 {\*\cs14\sl240\slmult1\f0\fs20\super Footnote Reference;}
52 {\s37\sl240\slmult1\fi-431\li720\f0\fs24\sbasedon31\snext31 Triangle List;}
53 {\s41\sl240\slmult1\f0\fs24\sbasedon31 Índice;}
54 {\s31\sl240\slmult1\f0\fs24 Predeterminado;}}
55 {\*\listtable
56 {\list\listtemplateid1067\listsimple{\listlevel\levelnfc0\levelstartat1\levelspace0\levelfollow0\fi-282\li282{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1010}
57 {\list\listtemplateid1068\listsimple{\listlevel\levelnfc4\levelstartat1\levelspace0\levelfollow0\fi-282\li566{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1027}
58 {\list\listtemplateid1069\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1028}
59 {\list\listtemplateid1070\listsimple{\listlevel\levelnfc4\levelstartat1\levelspace0\levelfollow0\fi-282\li566{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1029}
60 {\list\listtemplateid1071\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1030}
61 {\list\listtemplateid1072\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1031}
62 {\list\listtemplateid1073\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1032}
63 {\list\listtemplateid1074\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1033}
64 {\list\listtemplateid1075\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1034}
65 {\list\listtemplateid1076\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1035}
66 {\list\listtemplateid1077\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1036}
67 {\list\listtemplateid1078\listsimple{\listlevel\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1037}
68 {\list\listtemplateid1079\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1038}
69 {\list\listtemplateid1080\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1039}
70 {\list\listtemplateid1081\listsimple{\listlevel\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1040}
71 {\list\listtemplateid1082\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1041}
72 {\list\listtemplateid1083\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1042}
73 {\list\listtemplateid1084\listsimple{\listlevel\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1043}
74 {\list\listtemplateid1085\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1044}
75 {\list\listtemplateid1086\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1045}
76 {\list\listtemplateid1087\listsimple{\listlevel\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1046}
77 {\list\listtemplateid1088\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1047}
78 {\list\listtemplateid1089\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1048}
79 {\list\listtemplateid1090\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1049}
80 {\list\listtemplateid1091\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1050}
81 {\list\listtemplateid1092\listsimple{\listlevel\levelnfc4\levelstartat1\levelspace0\levelfollow0\fi-282\li566{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1051}
82 {\list\listtemplateid1093\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1052}
83 {\list\listtemplateid1094\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1053}
84 {\list\listtemplateid1095\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1054}
85 {\list\listtemplateid1096\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1055}
86 {\list\listtemplateid1097\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1056}
87 {\list\listtemplateid1098\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1057}
88 {\list\listtemplateid1099\listsimple{\listlevel\levelnfc4\levelstartat1\levelspace0\levelfollow0\fi-282\li566{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1058}
89 {\list\listtemplateid1100\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1059}
90 {\list\listtemplateid1101\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1060}
91 {\list\listtemplateid1102\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1061}
92 {\list\listtemplateid1103\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1062}
93 {\list\listtemplateid1104\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1063}
94 {\list\listtemplateid1105\listsimple{\listlevel\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1064}
95 {\list\listtemplateid1106\listsimple{\listlevel\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1065}
96 {\list\listtemplateid1107\listsimple{\listlevel\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}}\listid1066}}
97 {\*\listoverridetable
98 {\listoverride\listoverridecount0\listid1010\levelnfc0\levelstartat1\levelspace0\levelfollow0\fi-282\li282{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls1}
99 {\listoverride\listoverridecount0\listid1027\levelnfc4\levelstartat1\levelspace0\levelfollow0\fi-282\li566{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls2}
100 {\listoverride\listoverridecount0\listid1028\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls3}
101 {\listoverride\listoverridecount0\listid1029\levelnfc4\levelstartat1\levelspace0\levelfollow0\fi-282\li566{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls4}
102 {\listoverride\listoverridecount0\listid1030\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls5}
103 {\listoverride\listoverridecount0\listid1031\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls6}
104 {\listoverride\listoverridecount0\listid1032\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls7}
105 {\listoverride\listoverridecount0\listid1033\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls8}
106 {\listoverride\listoverridecount0\listid1034\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls9}
107 {\listoverride\listoverridecount0\listid1035\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls10}
108 {\listoverride\listoverridecount0\listid1036\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls11}
109 {\listoverride\listoverridecount0\listid1037\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls12}
110 {\listoverride\listoverridecount0\listid1038\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls13}
111 {\listoverride\listoverridecount0\listid1039\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls14}
112 {\listoverride\listoverridecount0\listid1040\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls15}
113 {\listoverride\listoverridecount0\listid1041\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls16}
114 {\listoverride\listoverridecount0\listid1042\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls17}
115 {\listoverride\listoverridecount0\listid1043\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls18}
116 {\listoverride\listoverridecount0\listid1044\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls19}
117 {\listoverride\listoverridecount0\listid1045\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls20}
118 {\listoverride\listoverridecount0\listid1046\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls21}
119 {\listoverride\listoverridecount0\listid1047\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls22}
120 {\listoverride\listoverridecount0\listid1048\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls23}
121 {\listoverride\listoverridecount0\listid1049\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls24}
122 {\listoverride\listoverridecount0\listid1050\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls25}
123 {\listoverride\listoverridecount0\listid1051\levelnfc4\levelstartat1\levelspace0\levelfollow0\fi-282\li566{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls26}
124 {\listoverride\listoverridecount0\listid1052\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls27}
125 {\listoverride\listoverridecount0\listid1053\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls28}
126 {\listoverride\listoverridecount0\listid1054\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls29}
127 {\listoverride\listoverridecount0\listid1055\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls30}
128 {\listoverride\listoverridecount0\listid1056\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls31}
129 {\listoverride\listoverridecount0\listid1057\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls32}
130 {\listoverride\listoverridecount0\listid1058\levelnfc4\levelstartat1\levelspace0\levelfollow0\fi-282\li566{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls33}
131 {\listoverride\listoverridecount0\listid1059\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls34}
132 {\listoverride\listoverridecount0\listid1060\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls35}
133 {\listoverride\listoverridecount0\listid1061\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls36}
134 {\listoverride\listoverridecount0\listid1062\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls37}
135 {\listoverride\listoverridecount0\listid1063\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls38}
136 {\listoverride\listoverridecount0\listid1064\levelnfc3\levelstartat1\levelspace0\levelfollow0\fi-282\li1133{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls39}
137 {\listoverride\listoverridecount0\listid1065\levelnfc1\levelstartat1\levelspace0\levelfollow0\fi-282\li1416{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls40}
138 {\listoverride\listoverridecount0\listid1066\levelnfc2\levelstartat1\levelspace0\levelfollow0\fi-282\li850{\leveltext\'02\'00.;}{\levelnumbers\'01;}\ls41}}
139
140 \kerning0\cf0\ftnbj\fet2\ftnstart1\ftnnar\aftnnar\ftnstart1\ftnrestart\ftnrstpg\aftnstart1\aftnrestart\aendnotes\aenddoc\facingp\titlepg{\info}\deftab720\viewkind1\paperw11905\paperh16837\margl1440\margr1440\widowctl
141 \sectd\sbknone\colsx0\pgncont\ltrsect
142 \pard\plain\ltrpar\qc\sb240\sa119\s10\sl240\slmult1\itap0{\f0\fs44\lang1033{\*\listtag0}\abinodiroverride\ltrch Storage-based Intrusion Detection}
143 \par{\listtext\pard\fi-282\li282\sb57 1.        }\pard\plain{\ltrpar\ql\fi-282\li282\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1010\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont NULL}{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Numbered List}}{\*\pn\pnql\pnstart1\pnlvlbody\pndec{\pntxtb }{\pntxta .}}\fn-282\li282\ls1\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang0{\*\listtag0}\abinodiroverride\ltrch Compromise independence}
144 \par}{\listtext\pard\fi-282\li566\sb57 a.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1027\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls2\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Client must not have administrator access to storage server}
145 \par}{\listtext\pard\fi-282\li566\sb57 b.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1027\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls2\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Server IDS administration must be done using a secured channel}
146 \par}{\listtext\pard\fi-282\li566\sb57 c.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1027\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls2\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch IDS can be located in several places}
147 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1028\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls3\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Directly in the hardware}{\f0\fs24\lang1033\ltrch{\*\listtag0} (}{\f0\fs24\lang1033{\*\listtag0}IDE,}{\f0\fs24\lang1033\ltrch{\*\listtag0} }{\f0\fs24\lang1033{\*\listtag0}SCSI,}{\f0\fs24\lang1033\ltrch{\*\listtag0} }{\f0\fs24\lang1033{\*\listtag0}etc}{\f0\fs24\lang1033\ltrch{\*\listtag0})}
148 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1028\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls3\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch In a virtual machine as a client}
149 \par}{\listtext\pard\fi-282\li850\sb57 iii.     }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1028\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls3\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch In a networked remote server}
150 \par}{\listtext\pard\fi-282\li282\sb57 2.       }\pard\plain{\ltrpar\ql\fi-282\li282\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1010\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Numbered List}}{\*\pn\pnql\pnstart1\pnlvlbody\pndec{\pntxtb }{\pntxta .}}\fn-282\li282\ls1\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Warning signs for Storage IDSs}
151 \par}{\listtext\pard\fi-282\li566\sb57 a.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1029\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls4\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Data or attribute modification}
152 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1030\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls5\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch System files change are usually warnings}
153 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1031\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls6\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Header files}
154 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1031\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls6\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Binary and script executable files}
155 \par}{\listtext\pard\fi-282\li1133\sb57 C.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1031\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls6\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Configuration files}
156 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1030\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls5\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch On system upgrade system files change are not warnings}
157 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1032\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls7\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Warning can be ignored by the administrator}
158 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1032\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls7\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch The administrator can avoid the warnings telling the IDS what files are about to change}
159 \par}{\listtext\pard\fi-282\li850\sb57 iii.     }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1030\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls5\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Better approach than comparing checksums}
160 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1033\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls8\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Immediate notification}
161 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1033\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls8\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch No reference database maintenance}
162 \par}{\listtext\pard\fi-282\li1133\sb57 C.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1033\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls8\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Avoid relaying on client OS to do checks that can be compromised by intruders}
163 \par}{\listtext\pard\fi-282\li1133\sb57 D.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1033\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls8\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch It can detect short-term changes made and then undone}
164 \par}{\listtext\pard\fi-282\li566\sb57 b.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1029\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls4\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Suspicious update patterns}
165 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1034\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls9\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Client system audit logs}
166 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1035\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls10\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Usually append only}
167 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1035\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls10\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch May be periodically}{\f0\fs24\lang1033\ltrch{\*\listtag0} \uc1\u8220\'93}{\f0\fs24\lang1033{\*\listtag0}rotated}{\f0\fs24\lang1033\ltrch{\*\listtag0}\uc1\u8221\'94}
168 \par}{\listtext\pard\fi-282\li1133\sb57 C.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1035\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls10\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Any other update pattern is suspicious}
169 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1034\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls9\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Timestamp reversal}
170 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1036\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls11\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch By manipulating the time stored in inodes an intruder hide some file manipulation}
171 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1036\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls11\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Some programs manipulate this timestamps legitimately}
172 \par}{\listtext\pard\fi-282\li1416\sb57 I.      }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1037\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls12\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch This programs usually change time of newly created files only}
173 \par}{\listtext\pard\fi-282\li1416\sb57 II.     }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1037\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls12\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Other timestamp manipulation can trigger an alert}
174 \par}{\listtext\pard\fi-282\li1416\sb57 III.    }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1037\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls12\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch An intruder can delete and re-create the file but this can be detected with more complex rules}
175 \par}{\listtext\pard\fi-282\li850\sb57 iii.     }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1034\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls9\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Storage DoS attacks}
176 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1038\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls13\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Allocating all or most of free space}
177 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1038\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls13\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Allocating all or most of inodes or metadata}
178 \par}{\listtext\pard\fi-282\li1133\sb57 C.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1038\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls13\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Resources exhaustion triggers an alarm}{\f0\fs24\lang1033\ltrch{\*\listtag0} (}{\f0\fs24\lang1033{\*\listtag0}administrator attention is needed soon}{\f0\fs24\lang1033\ltrch{\*\listtag0})}
179 \par}{\listtext\pard\fi-282\li850\sb57 iv.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1034\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls9\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch General warnings}
180 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1039\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls14\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Special attributes modification}{\f0\fs24\lang1033\ltrch{\*\listtag0} (}{\f0\fs24\lang1033{\*\listtag0}like set UID}{\f0\fs24\lang1033\ltrch{\*\listtag0})}
181 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1039\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls14\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Access patterns to well known file types}
182 \par}{\listtext\pard\fi-282\li1416\sb57 I.      }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1040\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls15\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Word processor}
183 \par}{\listtext\pard\fi-282\li1416\sb57 II.     }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1040\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls15\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Unix password management files}
184 \par}{\listtext\pard\fi-282\li1133\sb57 C.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1039\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls14\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Common patterns of system calls}
185 \par}{\listtext\pard\fi-282\li1133\sb57 D.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1039\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls14\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Prone to false alarms}
186 \par}{\listtext\pard\fi-282\li566\sb57 c.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1029\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls4\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Content integrity}
187 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1041\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls16\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Complexity}
188 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1042\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls17\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Must understand the format of a file}
189 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1042\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls17\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch File format may be arbitrarily complex and verification may require access to additional data blocks}
190 \par}{\listtext\pard\fi-282\li1133\sb57 C.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1042\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls17\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Security vs.}{\f0\fs24\lang1033\ltrch{\*\listtag0} }{\f0\fs24\lang1033{\*\listtag0}Performance trade-off decision needed}
191 \par}{\listtext\pard\fi-282\li1416\sb57 I.      }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1043\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls18\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Usually there are a few critical files checked}
192 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1041\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls16\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Unix system password file as a study case}
193 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1044\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls19\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Intruders can change root shell,}{\f0\fs24\lang1033\ltrch{\*\listtag0} }{\f0\fs24\lang1033{\*\listtag0}among other things}
194 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1044\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls19\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Can be avoided checking the shell is valid with}{\f0\fs24\lang1033\ltrch{\*\listtag0} }{\f0\fs24\lang1033{\*\listtag0}/etc/shells}
195 \par}{\listtext\pard\fi-282\li850\sb57 iii.     }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1041\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls16\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Write-ahead logs as a study case}
196 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1045\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls20\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Write-ahead logs can be used to detect intruders actions}
197 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1045\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls20\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Intruders can manipulate the data directly bypassing the logs}
198 \par}{\listtext\pard\fi-282\li1133\sb57 C.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1045\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls20\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch IDS can ensure logs consistency}
199 \par}{\listtext\pard\fi-282\li1416\sb57 I.      }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1046\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls21\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch All changes are reflected in the logs}
200 \par}{\listtext\pard\fi-282\li1416\sb57 II.     }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1046\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls21\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch No fake changes appear in the logs}
201 \par}{\listtext\pard\fi-282\li1416\sb57 III.    }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1046\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls21\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Triggers an alarm whenever these system invariants are violated}
202 \par}{\listtext\pard\fi-282\li566\sb57 d.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1029\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls4\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Suspicious content}
203 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1047\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls22\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Virus}
204 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1048\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls23\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Can detect known viruses by its signature}
205 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1048\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls23\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Viruses cannot disable the scanners even after infecting clients}
206 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1047\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls22\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Large number of hidden files}
207 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1049\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls24\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Hidden files are not displayed by normal directory listing interfaces}
208 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1049\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls24\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Their use may indicate that an intruder is using the system as a storage repository}
209 \par}{\listtext\pard\fi-282\li850\sb57 iii.     }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1047\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls22\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Large number of empty files or directories}
210 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1050\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls25\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch May indicate an attempt to exploit a race condition}
211 \par}{\listtext\pard\fi-282\li282\sb57 3.       }\pard\plain{\ltrpar\ql\fi-282\li282\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1010\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Numbered List}}{\*\pn\pnql\pnstart1\pnlvlbody\pndec{\pntxtb }{\pntxta .}}\fn-282\li282\ls1\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Responding to intrusions}
212 \par}{\listtext\pard\fi-282\li566\sb57 a.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1051\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls26\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Storage IDS should not interfere with a valid,}{\f0\fs24\lang1033\ltrch{\*\listtag0} }{\f0\fs24\lang1033{\*\listtag0}running system}
213 \par}{\listtext\pard\fi-282\li566\sb57 b.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1051\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls26\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch A detected intruder action may be a legitimate user action}{\f0\fs24\lang1033\ltrch{\*\listtag0} (}{\f0\fs24\lang1033{\*\listtag0}false alarm}{\f0\fs24\lang1033\ltrch{\*\listtag0})}
214 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1052\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls27\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Default response is to send an alarm}
215 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1053\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls28\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch To the administrator}
216 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1053\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls28\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch To an alert log file}
217 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1052\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls27\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Security vs.}{\f0\fs24\lang1033\ltrch{\*\listtag0} }{\f0\fs24\lang1033{\*\listtag0}potential damage caused by false alarm trade-off decision needed when making other responses}
218 \par}{\listtext\pard\fi-282\li566\sb57 c.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1051\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls26\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Slow down suspected intruder's storage access}
219 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1054\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls29\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Wait for alarm acknowledge before completing the suspicious request}
220 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1054\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls29\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Increase request latencies}
221 \par}{\listtext\pard\fi-282\li850\sb57 iii.     }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1054\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls29\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Could be annoying for users when is a false alarm but cause not damage}
222 \par}{\listtext\pard\fi-282\li566\sb57 d.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1051\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls26\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Isolate intruders via versioning at the file system level}
223 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1055\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls30\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch The file system forks the version tree on suspicious actions}
224 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1055\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls30\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Administrator can legitimate actions to be committed}
225 \par}{\listtext\pard\fi-282\li850\sb57 iii.     }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1055\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls30\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Forking can interfere with system operation}
226 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1056\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls31\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Hard reintegration of false alarms}
227 \par}{\listtext\pard\fi-282\li566\sb57 e.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1051\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls26\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Start versioning all data and auditing all storage request when an intrusion is detected}
228 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1057\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls32\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Provides the administrator with information for post-intrusion diagnosis and recovery}
229 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1057\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls32\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Intrusion-related information will likely be lost}
230 \par}{\listtext\pard\fi-282\li282\sb57 4.       }\pard\plain{\ltrpar\ql\fi-282\li282\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1010\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Numbered List}}{\*\pn\pnql\pnstart1\pnlvlbody\pndec{\pntxtb }{\pntxta .}}\fn-282\li282\ls1\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Limitations}
231 \par}{\listtext\pard\fi-282\li566\sb57 a.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1058\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls33\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Can produce false alarms}
232 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1059\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls34\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Few with specific rules}
233 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1059\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls34\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Grows with more general rules}
234 \par}{\listtext\pard\fi-282\li566\sb57 b.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1058\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls33\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Can fail to spot some intrusions}
235 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1060\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls35\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Intrusions that not cause storage odd behavior}
236 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1061\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls36\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Networked worms}
237 \par}{\listtext\pard\fi-282\li1133\sb57 B.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1061\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls36\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Modification of storage in unwatched ways}
238 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1060\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls35\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Can be improved using host IDSs and network IDSs too}
239 \par}{\listtext\pard\fi-282\li566\sb57 c.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1058\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls33\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033\ltrch{\*\listtag0}\uc1\u8220\'93}{\f0\fs24\lang1033{\*\listtag0}Game}{\f0\fs24\lang1033\ltrch{\*\listtag0}\uc1\u8221\'94 }{\f0\fs24\lang1033{\*\listtag0}of scalation}
240 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1062\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls37\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Intruders will change tactics}
241 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1062\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls37\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Rules must be updated to detect new tactics}
242 \par}{\listtext\pard\fi-282\li566\sb57 d.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1058\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls33\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Storage IDSs within individual components of decentralized storage systems are unlikely to be effective}
243 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1063\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls38\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Disk array controller is a fin place to storage IDS}
244 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1063\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls38\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Individual disks software striping is not}
245 \par}{\listtext\pard\fi-282\li1133\sb57 A.      }\pard\plain{\ltrpar\ql\fi-282\li1133\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1064\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucltr{\pntxtb }{\pntxta .}}\fn-282\li1133\ls39\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Each of the disks has only part of the file system's state}
246 \par}{\listtext\pard\fi-282\li1416\sb57 I.      }\pard\plain{\ltrpar\ql\fi-282\li1416\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1065\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Upper Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnucrm{\pntxtb }{\pntxta .}}\fn-282\li1416\ls40\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Difficult to check non-trivial rules}
247 \par}{\listtext\pard\fi-282\li566\sb57 e.       }\pard\plain{\ltrpar\ql\fi-282\li566\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1058\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Case List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcltr{\pntxtb }{\pntxta .}}\fn-282\li566\ls33\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Is not free}
248 \par}{\listtext\pard\fi-282\li850\sb57 i.       }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1066\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls41\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Processing overhead}
249 \par}{\listtext\pard\fi-282\li850\sb57 ii.      }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1066\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls41\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Memory resources consumption}
250 \par}{\listtext\pard\fi-282\li850\sb57 iii.     }\pard\plain{\ltrpar\ql\fi-282\li850\sb57\s31\f0\fs24\lang11274{\*\listtag0}{\*\abilist\abilistid1066\abilistparentid0\abilistlevel1\abistartat1{\abifieldfont }{\abilistdecimal .}{\abilistdelim %L.}{\abiliststyle Lower Roman List}}{\*\pn\pnql\pnstart1\pnlvlbody\pnlcrm{\pntxtb }{\pntxta .}}\fn-282\li850\ls41\ilvl0\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}\abinodiroverride\ltrch Security vs.}{\f0\fs24\lang1033\ltrch{\*\listtag0} }{\f0\fs24\lang1033{\*\listtag0}performance trade-off decision needed}
251 \par}\pard\plain\ltrpar\ql\sl240\slmult1\itap0{\f0\fs24\lang1033{\*\listtag0}}}