2 options
How to cheat at securing Linux / Mohan Krishnamurthy ... [et al.].
- Format:
- Book
- Author/Creator:
- Krishnamurthy Madwachar, Mohan.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- Linux.
- Physical Description:
- 1 online resource (433 p.)
- Place of Publication:
- Burlington, Mass. : Syngress, 2008.
- Language Note:
- English
- Summary:
- Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats.As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Lin
- Contents:
- Front Cover; Securing Linux; Copyright Page; Contents; Chapter 1. Presenting the Business Case for Open Source Software; Introduction; The Costs of Using Free Security Solutions; The Savings of Using Free Security Solutions; Comparing Free Solutions with Commercial Solutions; ""Selling"" a Free Solution; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Hardening the Operating System; Introduction; Updating the Operating System; Handling Maintenance Issues; Manually Disabling Unnecessary Services and Ports; Locking Down Ports; Hardening the System with Bastille
- Controlling and Auditing Root Access with SudoManaging Your Log Files; Using Logging Enhancers; Security Enhanced Linux; Securing Novell SUSE Linux; Novell AppArmor; Host Intrusion Prevention System; Linux Benchmark Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Enumeration and Scanning Your Network; Introduction; Scanning; Enumeration; How Scanning Works; Open Source Tools; Summary; Frequently Asked Questions; Chapter 4. Introducing Intrusion Detection and Snort; Introduction; How an IDS Works; Where Snort Fits; Snort System Requirements
- Exploring Snort's FeaturesUsing Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Installing and Configuring Snort and Add-Ons; Placing Your NIDS; Configuring Snort on Linux; Other Snort Add-Ons; Demonstrating Effectiveness; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Advanced Snort Deployment; Introduction; Monitoring the Network; Configuring Channel Bonding for Linux; Snort Rulesets; Plug-Ins; Preprocessor Plug-Ins; Detection Plug-Ins; Output Plug-Ins; Snort Inline
- Solving Specific Security RequirementsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Network Analysis, Troubleshooting, and Packet Sniffing; Introduction; What Is Network Analysis and Sniffing?; Who Uses Network Analysis?; How Does It Work?; Sniffing Wireless; Protocol Dissection; Protecting Against Sniffers; Network Analysis and Policy; Frequently Asked Questions; Chapter 8. Basics of Cryptography and Encryption; Introduction; Algorithms; Concepts of Using Cryptography; Summary; Solutions Fast Track; Frequently Asked Questions
- Chapter 9. Perimeter Security, DMZs, Remote Access, and VPNsIntroduction; Firewall Types; Firewall Architectures; Implementing Firewalls; Providing Secure Remote Access; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Linux Bastion Hosts; Introduction; System Installation; Removing Optional Components; Additional Steps; Controlling Access to Resources; Auditing Access to Resources; Remote Administration; Bastion Host Configurations; Bastion Host Maintenance and Support; Linux Bastion Host Checklist; Summary; Solutions Fast Track; Frequently Asked Questions
- Chapter 11. Apache Web Server Hardening
- Notes:
- Includes index.
- ISBN:
- 1-281-32549-X
- 9786611325497
- 0-08-055868-2
- OCLC:
- 437211968
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.