Linux Security Fundamentals

Linux Security Fundamentals
Автор книги: id книги: 1887907     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 3382,78 руб.     (36,72$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119781561 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Includes one year of FREE access after activation to the online test bank and study tools: Custom practice exam 100 electronic flashcards Searchable key term glossary The Sybex™ method for teaching Linux® security concepts Understanding Linux Security is essential for administration professionals. Linux Security Fundamentals covers all the IT security basics to help active and aspiring admins respond successfully to the modern threat landscape. You'll improve your ability to combat major security threats against computer systems, networks, and services. You'll discover how to prevent and mitigate attacks against personal devices and how to encrypt secure data transfers through networks, storage devices, or the cloud. Linux Security Fundamentals teaches: Using Digital Resources Responsibly What Vulnerabilities and Threats Are Controlling Access to Your Assets Controlling Network Connections Encrypting Data, Whether at Rest or Moving Risk Assessment Configuring System Backups and Monitoring Resource Isolation Design Patterns Interactive learning environment Take your skills to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep , register your book to receive your unique PIN, and instantly gain one year of FREE access to: Interactive test bank with a practice exam to help you identify areas where you need to expand your knowledge 100 electronic flashcards to reinforce what you've learned Comprehensive glossary in PDF format gives you instant access to key terms you use in your job

Оглавление

David Higby Clinton. Linux Security Fundamentals

Linux® Security Fundamentals

Acknowledgments

About the Author

About the Technical Editor

CONTENTS

List of Illustrations

Guide

Pages

Introduction

What Does This Book Cover?

Interactive Online Learning Environment and Test Bank

Chapter 1 Using Digital Resources Responsibly

Protecting Personal Rights

Protecting Digital Privacy

What Is Personal Data?

Where Might My Personal Data Be Hanging Out?

Browsing Histories

Ecommerce and Social Media Account Data

Government Databases

Public Archives

The Dark Web

What Are My Responsibilities as a Site Administrator?

Can Escaped Genies Be Forced Back into Their Bottles?

What Can I Do as a User?

Establishing Authenticity

Think About the Source

Be Aware of Common Threat Categories

Summary

Back to the Basics

Review Questions

Chapter 2 What Are Vulnerabilities and Threats?

The Basics: What Are We Trying to Accomplish Here?

What Are Vulnerabilities and Threats?

What Can Be Exploited?

Who’s Doing the Exploiting?

Why Do They Attack?

Identity Theft

Data Exfiltration

Resource Destruction

Common Vulnerabilities

Software Vulnerabilities

Hardware Vulnerabilities

Bioware Vulnerabilities

Digital Espionage

USB Devices

Backdoors

Wireless Entry Points

Stolen Credentials

Data Breaches

Identity Theft (Besides Breaches)

Malware

Network-Based Attacks

Man-in-the-Middle Attacks

Denial-of-Service and Distributed Denial-of-Service Attacks

Network Routing Attacks

Summary

Back to the Basics

Review Questions

Chapter 3 Controlling Access to Your Assets

Controlling Physical Access

Understanding Your Devices

How Compute Works

How Memory Works

How Storage Works

How Peripherals (Might Not) Work

Protecting Your Devices

Who Else Is Watching?

The Problem with USB Devices

Managing Authentication Through Effective Password Use

Password Policies

Password Managers

Multifactor Authentication

Monitoring for Compromised Passwords

Managing Authorization Through Permissions

Controlling Network Access

Firewalls

Software vs. Hardware Firewalls

Local vs. Cloud Firewalls

Virus and Malware Protection

Network Firewalls vs. Application Firewalls

Educating Your Users

Controlling Software Sources

PC Software Repositories

Mobile Package Management

Summary

Back to the Basics

Review Questions

Chapter 4 Controlling Network Connections

Understanding Network Architecture

The Transmission Control Protocol

The Internet Protocol

IPv4 Addressing

NAT Address Translation

IPv6 Addressing

Understanding the Domain Name System

Auditing Networks

Network Auditing Tools

Nmap (Mapping)

Wireshark

Automating Audits

Securing Networks

Patch Your Software

Physically Secure Your Infrastructure

Secure Your Network Behavior

Other Stuff

Summary

Back to the Basics

Review Questions

Chapter 5 Encrypting Your Data at Rest

What Is Encryption?

Encryption Usage Patterns

What Should You Encrypt?

Understanding Hashing vs. Encryption

What Are Blockchains?

Encryption Technologies

Summary

Back to the Basics

Review Questions

Chapter 6 Encrypting Your Moving Data

Website Encryption

Why You Should Use Encryption

How Website Encryption Works

Generating Certificates

Email Encryption

GNU Privacy Guard

Does Gmail Encrypt Your Emails?

Working with VPN Connections and Software Repositories

Securing Your Actions Using VPNs

Securing Transfers from Software Repositories

Summary

Back to the Basics

Review Questions

Chapter 7 Risk Assessment

Conducting Open Source Intelligence Gathering

Accessing Public Vulnerability Databases

Vulnerability Data Frameworks

Vulnerability Data Formats

Vulnerability Data Metrics

Vulnerability Data Management Tools

Conducting Vulnerability Scans

Conducting Penetration Tests

Attack Vectors

Tooling Frameworks

Follow-Up

Summary

Back to the Basics

Review Questions

Chapter 8 Configuring System Backups and Monitoring

Why You Need to Get Backups Right the First Time

Appreciating the Risks

Spreading Your Backups Across Multiple Sites

Testing Your Backups

Meeting Regulatory Compliance

Backup Types

Incremental Backups

Differential Backups

Backup Life Cycles

Multitier Backups

Multisite Storage Solutions

Disaster Recovery Planning

Configuring Monitoring and Alerts

Working with System Logs

Intrusion Detection

Summary

Back to the Basics

Review Questions

Chapter 9 Resource Isolation Design Patterns

Configuring Network Firewalling

Balancing Public and Private Networks

Building Isolated Development Environments

Working with Sandbox Environments

Use Cases for Sandboxes

Sandbox Designs

Controlling Local System Access

Configuring Mandatory Access Controls

Setting Usage Quotas

Summary

Back to the Basics

Review Questions

Appendix Answers to Review Questions. Chapter 1: Using Digital Resources Responsibly

Chapter 2: What are Vulnerabilities and Threats?

Chapter 3: Controlling Access to Your Assets

Chapter 4: Controlling Network Connections

Chapter 5: Encrypting Your Data at Rest

Chapter 6: Encrypting Your Moving Data

Chapter 7: Risk Assessment

Chapter 8: Configuring System Backups and Monitoring

Chapter 9: Resource Isolation Design Patterns

Index. Numbers

A

B

C

D

E

F

G

H

I

J–K

L

M

N

O

P

Q–R

S

T

U

V

W

X–Y–Z

Online Test Bank

Register and Access the Online Test Bank

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

David Clinton

In a previous life, David spent 20 years as a high school teacher. He currently lives in Toronto, Canada with his wife and family and can be reached through his website: https://bootstrap-it.com.

.....

Even getting private references removed from search engine results can involve a long, uphill struggle with no guarantee of success. Thanks to the GDPR, European residents can request help from Google using the Personal Information Removal Request Form. But you can never be sure how that will turn out, and sometimes submitting your request can make things worse. Considering taking down an offending website? Are you sure you even know how to find all the copies? Are you aware, for instance, that the Internet Archive project (https://archive.org/web/), as of this writing, hosts historical versions of more than 376 billion web pages? I’ve actually used the project to recover lost data from 15-year-old iterations of my own sites.

Here’s a good place to start: think carefully before posting anything on an online platform. Are you revealing too much about yourself? Will you be comfortable having your future employers and grandchildren read this 10 or 20 years from now? Try to anticipate the places your content might end up and what value it might have for people you’ve never met—people unconstrained by ethical concerns who care only about making money.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Linux Security Fundamentals
Подняться наверх