Flylib.com
Hardening Linux
Hardening Linux
ISBN: 0072254971
EAN: 2147483647
Year: 2004
Pages: 113
Authors:
John Terpstra
,
Paul Love
,
Ronald P. Reck
,
Tim Scanlon
BUY ON AMAZON
Table of Contents
BackCover
Hardening Linux
Foreword
From Corey D. Schou
Introduction
Linux Naming Conventions Used in This Book
Part I: Do These Seven Things First
Chapter 1: Critical First Steps
Examine Systems for Evidence of Compromise
Check System Stability and Availability
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Hardening Network Access: Disable Unnecessary Services
Step 1: Take the Machine Off the Network
Step 2: Determine Required Services
Step 3: Determine Services Dependencies
Step 4: Prevent Services from Running
Step 5: Reboot
Step 6: Check Configuration for Unnecessary Services
Step 7: Check Configuration for Necessary Services
Step 8: Return the Machine to the Network
Chapter 3: Installing Firewalls and Filters
Take Stock
Identify Protective Firewall Needs
Chapter 4: Hardening Software Accessibility
Identify Required Software
Determine Software Dependencies
Remove or Restrict Unneeded Software
Install Software Securely
Monitor Your Systems
Chapter 5: Preparing for Disaster
Do Not Build a Custom Kernel
Document Server Setup and Record Changes
Prepare Automated Reinstallation
Chapter 6: Hardening Access Controls
Review File and Directory Access Controls
Chapter 7: Hardening Data Storage
Use Proper Procedures
Use GnuPG to Encrypt Files
Use OpenSSL for File Encryption
Install and Use a Cryptographic File System
Chapter 8: Hardening Authentication and User Identity
Correctly Configure PAM to Avoid Compromise
Name Switching Service (NSS)
Chapter 9: Restricted Execution Environments
Use chroot to Protect a Service
Build the chroot Directory Structure
Install the Service(s) to the chroot Directory
Configure the Service to Log Activity
Troubleshoot chroot Environment Problems
Combine chroot and Your Distribution s Security Capabilities
Maintain chroot
Chapter 10: Hardening Communications
Secure Protocols
IPSec
Part III: Once Is Never Enough
Chapter 11: Install Network Monitoring Software
Install a Network Analyzer
Utilize a Network Intrusion Detection System
HoneypotsHoneynets
Other Tools
Chapter 12: Automatic Logfile Scanning
Create a Logfile Policy
Configure the syslog Daemon
Set Up a Centralized Server
Create a Centralized Server with syslog-ng and stunnel
Other System Logfiles
Search Logfiles
Chapter 13: Patch Management and Monitoring
Patch Monitoring and Management
Chapter 14: Self-Monitoring Tools
Install and Run a Host-Based Intrusion Detection System
Install and Run a Password Checker
Set Up Network Monitoring
Part IV: How to Succeed at Hardening Linux
Chapter 15: Budget Acquisition and Corporate Commitment to Security
Obtain Management Support
Perform a Risk Assessment
Determine Return on Investment (ROI)
Chapter 16: Establishing a Security Campaign
Appendix: Additional Linux Security Resources
General Security
General Linux Security
Linux Security Programs
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
List of Figures
List of Tables
List of Listings
List of Sidebars
Hardening Linux
ISBN: 0072254971
EAN: 2147483647
Year: 2004
Pages: 113
Authors:
John Terpstra
,
Paul Love
,
Ronald P. Reck
,
Tim Scanlon
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Making Programs Think Branching Statements and Subroutines
More Power to the Numbers Data Sequences and Arrays
Number Crunching Mathematical and Relational Operators and Commands
Adding Sound Effects to Your Game
Multiplayer Programming The Crazy Carnage Game
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Five Stimulating Interest
Chapter Fourteen Getting Started with the Process
Chapter Fifteen Sales Management System: Managers Managing Pipelines and Salespeople
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
An Introduction to Design Patterns in C++ with Qt 4
Friends of a Class
Q_OBJECT and moc: A Checklist
Sorted Map Example
Reusing id3lib
Appendix B. Standard Headers
Junos Cookbook (Cookbooks (OReilly))
Setting Up Login Accounts on the Router
Controlling SNMP Access to the Router
Configuring Frame Relay on a T1 Interface
RIP
Prioritizing LSPs
Quantitative Methods in Project Management
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Time Management
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
GDI+ Programming with C#
Advanced Typography
The Rectangle Structure
Working with Images
Working with Bitmaps
Getting into the Details: Custom Controlling and the Print Controller
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies