TOC


   
     
Mac OS X Maximum Security
By John  Ray, Dr.  William  Ray
   
Publisher : Sams Publishing
Pub Date : April 25, 2003
ISBN : 0-672-32381-8
       


      Copyright
      About the Authors
      Contributing Author
      Acknowledgments
      We Want to Hear from You!
      Reader Services
      Introduction
      Part  I.   Mac OS X Security Basics: Learning to Think Secure
        Chapter 1.   An Introduction to Mac OS X Security
        What Is Security?
        Traditional Mac OS Versus Mac OS X
        Understanding the Threat
        Summary
        Chapter 2.   Thinking Secure: Security Philosophy and Physical Concerns
        Physical System Vulnerabilities
        Server Location and Physical Access
        Server and Facility Location
        Physical Access to the Facility
        Computer Use Policies
        Physical Security Devices
        Network Considerations
        Summary
        Chapter 3.   People Problems: Users, Intruders, and the World Around Them
        Your Users: People with Whom You Share Your Computer
        The Bad Guys: People Who Would Do Your System Harm
        Everybody Else
        Summary
      Part  II.   Vulnerabilities and Exposures: How Things Don't Work, and Why
        Chapter 4.   Theft and Destruction of Property: Data Attacks
        Keeping Data Secret: Cryptography, Codes, and Ciphers
        Data-Divulging Applications
        Steganography and Steganalysis: Hiding Data in Plain Sight, and How to Find and Eliminate It
        Summary
        Chapter 5.   Picking Locks: Password Attacks
        Typical Password Mechanisms
        Testing Password Security
        Improving Password Security, and Alternatives to the Standard Password Mechanisms in Mac OS X
        Summary
        Chapter 6.   Evil Automatons: Malware, Trojans, Viruses, and Worms
        Defining Software Behavioral Space
        Malware
        Malware Threats
        Solving the Problem
        Summary
        Chapter 7.   Eavesdropping and Snooping for Information: Sniffers and Scanners
        Eavesdropping and Information Gathering
        Monitoring Traffic with tcpdump
        Sniffing Around with Ettercap
        Network Surveys with NMAP
        Other Information-Gathering Tools
        Ethics of Information Gathering
        Additional Resources
        Summary
        Chapter 8.   Impersonation and Infiltration: Spoofing
        Spoofing Attacks
        Spoofing Defenses
        Summary
        Chapter 9.   Everything Else
        DoS
        Buffer Overflows
        Session Hijacking
        Everything Else
        Additional Resources
        Summary
      Part  III.   Specific Mac OS X Resources and How to Secure Them: Security Tips, Tricks, and Recipes
        Chapter 10.   User, Environment, and Application Security
        Adding a New User
        Using the NetInfo Database to Customize a User
        Sane User Account Management
        Skeleton User Accounts
        Command-Line Administration Tools
        Restricting User Capabilities
        Summary
        Chapter 11.   Introduction to Mac OS X Network Services
        What Is a Network Service?
        Network Service Vulnerabilities
        Controlling Mac OS X Network Service Processes
        Protecting inetd with TCP Wrappers
        Increasing Security with xinetd
        Summary
        Chapter 12.   FTP Security
        FTP Vulnerabilities
        Activating the FTP Server
        Configuring the Default lukemftpd FTP Server
        Setting Up Anonymous FTP
        Replacing the Mac OS X FTP Server
        Alternatives to FTP
        Summary
        Chapter 13.   Mail Server Security
        Basic Vulnerabilities
        Sendmail
        Activating Sendmail on Mac OS X
        Protecting Sendmail
        Updating Your Sendmail Installation
        Postfix as an Alternative
        Installing Postfix
        Protecting Postfix
        Delivering Mail ”UW IMAP
        Summary
        Chapter 14.   Remote Access: Secure Shell, VNC, Timbuktu, Apple Remote Desktop
        What Is SSH?
        SSH Vulnerabilities
        Vulnerabilities in telnet and rlogin
        Activating SSH
        Advanced SSH Features
        GUI Access Methods
        Summary
        Chapter 15.   Web Server Security
        Introducing Apache
        SSL-Protected Apache
        Additional Resources
        Summary
        Chapter 16.   File Sharing Security
        Apple Filing Protocol
        WebDAV
        Sharing Files with Samba
        Common Unix Printing System
        Other Resources
        Summary
      Part  IV.   Prevention, Detection, and Reaction to Attacks: Health Care and Checkups for Your Machine
        Chapter 17.   Blocking Network Access: Firewalls
        Firewalling
        Built-In GUI Mac OS X Firewall Tools
        Built-In Command-Line Mac OS X Firewall Tools
        Firewall Hardware
        Firewall Resources
        Summary
        Chapter 18.   Alarm Systems: Intrusion Detection
        What Is Intrusion Detection?
        Psionic PortSentry
        Snort
        IDS Resources
        Summary
        Chapter 19.   Logs and User Activity Accounting
        The Role of Logs
        User Logins and Accounting
        Automated Log Monitoring: LogSentry
        Common System Log Changes
        Summary
        Chapter 20.   Disaster Planning and Recovery
        What Is Disaster Recovery and Why Do You Need It?
        Creating a Disaster Recovery Plan
        Mac OS X Backup Software
        Synchronizing Files: rsync
        Summary
      Part  V.   Appendixes
        Appendix A.   Glossary
        Appendix B.   Security Resources
        Appendix C.   Secure Web Development
        Web Development Risks
        Protecting Your Web Applications
        Adding and Using suEXEC
        Testing for Known CGI Vulnerabilities: Whisker
        Additional Resources
      Index

Top


Mac OS X Maximum Security
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net