Flylib.com
Hardening Linux
Hardening Linux
ISBN: 0072254971
EAN: 2147483647
Year: 2004
Pages: 113
Authors:
John Terpstra
,
Paul Love
,
Ronald P. Reck
,
Tim Scanlon
BUY ON AMAZON
Table of Contents
BackCover
Hardening Linux
Foreword
From Corey D. Schou
Introduction
Linux Naming Conventions Used in This Book
Part I: Do These Seven Things First
Chapter 1: Critical First Steps
Examine Systems for Evidence of Compromise
Check System Stability and Availability
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Hardening Network Access: Disable Unnecessary Services
Step 1: Take the Machine Off the Network
Step 2: Determine Required Services
Step 3: Determine Services Dependencies
Step 4: Prevent Services from Running
Step 5: Reboot
Step 6: Check Configuration for Unnecessary Services
Step 7: Check Configuration for Necessary Services
Step 8: Return the Machine to the Network
Chapter 3: Installing Firewalls and Filters
Take Stock
Identify Protective Firewall Needs
Chapter 4: Hardening Software Accessibility
Identify Required Software
Determine Software Dependencies
Remove or Restrict Unneeded Software
Install Software Securely
Monitor Your Systems
Chapter 5: Preparing for Disaster
Do Not Build a Custom Kernel
Document Server Setup and Record Changes
Prepare Automated Reinstallation
Chapter 6: Hardening Access Controls
Review File and Directory Access Controls
Chapter 7: Hardening Data Storage
Use Proper Procedures
Use GnuPG to Encrypt Files
Use OpenSSL for File Encryption
Install and Use a Cryptographic File System
Chapter 8: Hardening Authentication and User Identity
Correctly Configure PAM to Avoid Compromise
Name Switching Service (NSS)
Chapter 9: Restricted Execution Environments
Use chroot to Protect a Service
Build the chroot Directory Structure
Install the Service(s) to the chroot Directory
Configure the Service to Log Activity
Troubleshoot chroot Environment Problems
Combine chroot and Your Distribution s Security Capabilities
Maintain chroot
Chapter 10: Hardening Communications
Secure Protocols
IPSec
Part III: Once Is Never Enough
Chapter 11: Install Network Monitoring Software
Install a Network Analyzer
Utilize a Network Intrusion Detection System
HoneypotsHoneynets
Other Tools
Chapter 12: Automatic Logfile Scanning
Create a Logfile Policy
Configure the syslog Daemon
Set Up a Centralized Server
Create a Centralized Server with syslog-ng and stunnel
Other System Logfiles
Search Logfiles
Chapter 13: Patch Management and Monitoring
Patch Monitoring and Management
Chapter 14: Self-Monitoring Tools
Install and Run a Host-Based Intrusion Detection System
Install and Run a Password Checker
Set Up Network Monitoring
Part IV: How to Succeed at Hardening Linux
Chapter 15: Budget Acquisition and Corporate Commitment to Security
Obtain Management Support
Perform a Risk Assessment
Determine Return on Investment (ROI)
Chapter 16: Establishing a Security Campaign
Appendix: Additional Linux Security Resources
General Security
General Linux Security
Linux Security Programs
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
List of Figures
List of Tables
List of Listings
List of Sidebars
Hardening Linux
ISBN: 0072254971
EAN: 2147483647
Year: 2004
Pages: 113
Authors:
John Terpstra
,
Paul Love
,
Ronald P. Reck
,
Tim Scanlon
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Agile Project Management
Phase: Explore
Phase: Close
Individual Performance
Practice: Product, Project, and Team Review and Adaptive Action
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Logistics in Tesco: Past, Present and Future
Temperature-Controlled Supply Chains
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 12. Enter Dates and Clear Formats
Objective 14. Format Worksheets in a Workbook
Performance Assessments
GO! with Help
Objective 6. Insert an Excel Chart into a PowerPoint Presentation
DNS & BIND Cookbook
Getting a Precompiled Version of BIND
Configuring Multiple Mail Servers in DNS
Limiting Concurrent Recursive Clients
Securing Zone Transfers
Restricting the Queries a Name Server Answers
FileMaker 8 Functions and Scripts Desk Reference
Text Functions
Get(AccountName)
Get(WindowWidth)
LeftValues()
SetPrecision()
Java All-In-One Desk Reference For Dummies
Installing and Using Java Tools
Working with TextPad
Adding Some Methods to Your Madness
Understanding Object-Oriented Programming
Making Your Own Classes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies