C++ CSS HTML Java JavaScript MySQL Oracle PERL PHP SQL Unix VBScript XHTML XML Сети

Red Hat Linux 9

 

Red Hat Linux 9

Red Hat Linux Security Guide


Table of Contents
Introduction
1. Document Conventions
2. More to Come
2.1. Send in Your Feedback
I. A General Introduction to Security
1. Security Overview
1.1. What is Computer Security?
1.2. Security Controls
1.3. Conclusion
2. Attackers and Vulnerabilities
2.1. A Quick History of Hackers
2.2. Threats to Network Security
2.3. Threats to Server Security
2.4. Threats to Workstation and Home PC Security
II. Configuring Red Hat Linux for Security
3. Security Updates
3.1. Using Red Hat Network
3.2. Using the Errata Website
4. Workstation Security
4.1. Evaluating Workstation Security
4.2. BIOS and Boot Loader Security
4.3. Password Security
4.4. Administrative Controls
4.5. Available Network Services
4.6. Personal Firewalls
4.7. Security Enhanced Communication Tools
5. Server Security
5.1. Securing Services With TCP Wrappers and xinetd
5.2. Securing Portmap
5.3. Securing NIS
5.4. Securing NFS
5.5. Securing Apache HTTP Server
5.6. Securing FTP
5.7. Securing Sendmail
5.8. Verifying Which Ports Are Listening
6. Virtual Private Networks
6.1. VPNs and Red Hat Linux
6.2. Crypto IP Encapsulation (CIPE)
6.3. Why Use CIPE?
6.4. CIPE Installation
6.5. CIPE Server Configuration
6.6. Configuring Clients for CIPE
6.7. Customizing CIPE
6.8. CIPE Key Management
7. Firewalls
7.1. Netfilter and IPTables
7.2. IP6Tables
7.3. Additional Resources
III. Assessing Your Security
8. Vulnerability Assessment
8.1. Thinking Like the Enemy
8.2. Defining Assessment and Testing
8.3. Evaluating the Tools
IV. Intrusions and Incident Response
9. Intrusion Detection
9.1. Defining Intrusion Detection Systems
9.2. Host-based IDS
9.3. Network-based IDS
10. Incident Response
10.1. Defining Incident Response
10.2. Creating an Incident Response Plan
10.3. Implementing the Incident Response Plan
10.4. Investigating the Incident
10.5. Restoring and Recovering Resources
10.6. Reporting the Incident
V. Appendixes
A. Common Exploits and Attacks
Index
Colophon
© 2000- NIV