In Part I, we looked at the many parts of system configuration that must be done correctly to secure a system. We looked at the human factors of password selection, policies, and procedures. Recent security bugs in critical programs and recent exploits were examined. Some case studies were made. Lastly, we hardened our system some more. Now, let us prepare for war! The topics covered in this chapter include:
|
Top |