Читать книгу Linux Security Fundamentals - David Higby Clinton - Страница 6

Оглавление

CONTENTS

Cover

Title Page

Copyright

Acknowledgments

About the Author

About the Technical Editor

Introduction What Does This Book Cover? Interactive Online Learning Environment and Test Bank

Chapter 1 Using Digital Resources Responsibly Protecting Personal Rights Protecting Digital Privacy Establishing Authenticity Summary Back to the Basics Review Questions

Chapter 2 What Are Vulnerabilities and Threats? The Basics: What Are We Trying to Accomplish Here? Common Vulnerabilities Digital Espionage Stolen Credentials Malware Network-Based Attacks Summary Back to the Basics Review Questions

10  Chapter 3 Controlling Access to Your Assets Controlling Physical Access Controlling Network Access Controlling Software Sources Summary Back to the Basics Review Questions

11  Chapter 4 Controlling Network Connections Understanding Network Architecture Auditing Networks Securing Networks Summary Back to the Basics Review Questions

12  Chapter 5 Encrypting Your Data at Rest What Is Encryption? Encryption Usage Patterns Encryption Technologies Summary Back to the Basics Review Questions

13  Chapter 6 Encrypting Your Moving Data Website Encryption Email Encryption Working with VPN Connections and Software Repositories Summary Back to the Basics Review Questions

14  Chapter 7 Risk Assessment Conducting Open Source Intelligence Gathering Accessing Public Vulnerability Databases Conducting Vulnerability Scans Conducting Penetration Tests Summary Back to the Basics Review Questions

15  Chapter 8 Configuring System Backups and Monitoring Why You Need to Get Backups Right the First Time Backup Types Multitier Backups Configuring Monitoring and Alerts Summary Back to the Basics Review Questions

16  Chapter 9 Resource Isolation Design Patterns Configuring Network Firewalling Working with Sandbox Environments Controlling Local System Access Summary Back to the Basics Review Questions

17  Appendix Answers to Review Questions Chapter 1: Using Digital Resources Responsibly Chapter 2: What are Vulnerabilities and Threats? Chapter 3: Controlling Access to Your Assets Chapter 4: Controlling Network Connections Chapter 5: Encrypting Your Data at Rest Chapter 6: Encrypting Your Moving Data Chapter 7: Risk Assessment Chapter 8: Configuring System Backups and Monitoring Chapter 9: Resource Isolation Design Patterns

18  Index

19  End User License Agreement

List of Illustrations

1 Chapter 3 Figure 3.1 The stages involved in booting a (Linux) computer using UEFIFigure 3.2 A typical account entry within a password managerFigure 3.3 The results of an email search of the HIBP databaseFigure 3.4 The results of a search of the HIBP database for a password stringFigure 3.5 Permission levels assigned to users and a user groupFigure 3.6 A simplified illustration of the contents of a TCP data packet including metadat...Figure 3.7 A typical network setup where a firewall device stands between the internet and ...Figure 3.8 An AWS EC2 security group permitting SSH and browser (HTTP) traffic into the res...

2 Chapter 4 Figure 4.1 A typical example of IP address allocations within a private subnetFigure 4.2 A NAT server translating IP addresses and managing traffic between local and pub...Figure 4.3 The Wireshark “home” screen showing links to all the networks available to the s...Figure 4.4 The results of a typical network scan shown in Wireshark

3 Chapter 5 Figure 5.1 A typical symmetric encryption and decryption processFigure 5.2 The recipient’s public key is used to encrypt and later decrypt a file with the ...Figure 5.3 The sender’s public key is used to encrypt and later decrypt a file with the use...Figure 5.4 The step-by-step representation of a blockchain transaction

4 Chapter 6 Figure 6.1 The successful SSL Report on the TLS configuration for the bootstrap-it.com webs...Figure 6.2 The conversation between a client browser and a TLS-powered web serverFigure 6.3 Installation instructions on the Certbot websiteFigure 6.4 A typical VPN running through a secure tunnel connection

5 Chapter 7 Figure 7.1 The NVD DashboardFigure 7.2 A layered diagram of NVD-related tools

6 Chapter 8 Figure 8.1 Some output from the dmesg command on a Linux Ubuntu 18.04 system. Exciting read...

7 Chapter 9 Figure 9.1 Public-facing web servers are allowed fairly open access from public networks, w...Figure 9.2 A common dual-firewall DMZ setupFigure 9.3 A bastion host is a server placed within a DMZ through which remote admins can a...Figure 9.4 The VirtualBox network adapter configuration dialog box

Guide

Cover

Table of Contents

Introduction

Pages

i

ii

iii

v

xiii

xiv

xv

1

2

10  3

11  4

12  5

13  6

14  7

15  8

16  9

17  10

18  11

19 12

20 13

21  15

22  16

23  17

24  18

25 19

26  20

27  21

28  22

29  23

30  24

31  25

32  26

33  27

34  28

35 29

36 30

37 31

38  33

39  34

40  35

41  36

42  37

43  38

44  39

45  40

46  41

47  42

48  43

49  44

50  45

51  46

52  47

53  48

54  49

55  50

56  51

57  52

58  53

59  54

60 55

61 56

62 57

63  59

64  60

65  61

66  62

67  63

68  64

69  65

70  66

71  67

72  68

73  69

74  70

75  71

76  72

77  73

78  74

79  75

80  76

81 77

82 78

83 79

84  81

85  82

86  83

87  84

88  85

89  86

90  87

91  88

92  89

93  90

94 91

95  93

96  94

97  95

98  96

99  97

100  98

101  99

102  100

103  101

104  102

105  103

106  104

107  105

108  106

109 107

110 108

111  109

112  110

113  111

114  112

115  113

116 114

117  115

118  116

119  117

120  118

121  119

122  120

123  121

124 122

125 123

126  125

127  126

128  127

129  128

130  129

131  130

132  131

133  132

134  133

135  134

136  135

137  136

138  137

139  138

140  139

141 140

142 141

143  143

144  144

145  145

146  146

147  147

148  148

149  149

150  150

151  151

152  152

153  153

154 154

155  155

156  156

157  157

158 158

159 159

160 160

161 161

162 162

163 163

164 164

165  165

166 166

167  167

168 168

169 169

170  170

171 171

172 172

173 173

174 174

175  175

176  176

177  177

Linux Security Fundamentals

Подняться наверх