Chapter 10: Hardening Communications


Overview

Communications can be the bane of any security administrator. They are required for business purposes in most cases, but can be the weak point in the security schema if not employed properly. To secure your network, you should

  • Use SSH in lieu of unencrypted protocols

  • Set up password-free logins as required

  • Replace r services and FTP with SSH equivalents

  • Implement SSH port forwarding

  • Secure X connections with SSH

  • User virtual private networks




Hardening Linux
Hardening Linux
ISBN: 0072254971
EAN: 2147483647
Year: 2004
Pages: 113

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net