Linux Essentials for Cybersecurity
Linux 网络安全精要
Introduction
简介
Introduced as a hobby project in 1991, Linux has become a dominant player in
the IT market today. Although technically Linux refers to a specific software
piece (the kernel), many people refer to Linux as a collection of software tools
that make up a robust operating system.
Linux 于 1991 年作为业余爱好项目推出,现今已成为 IT 市场的重要力量。虽然从技术上讲Linux指的是特定的软件代码(内核),许多人称构成强大的操作系统所有软件工具的集合为Linux。
Linux is a heavily used technology throughout the IT industry, and it is used as
an alternative to more common platforms because of its security, low cost, and
scalability. The Linux OS is used to power a larger variety of servers, including
email and web servers. Additionally, it is often favored by software developers
as the platform they code on.
Linux 是整个 IT 行业广泛使用的技术,因为安全性、低成本和可 伸缩 性而被用来替代常见的平台。Linux 操作系统用于承载很多种类的服务器,包括电子邮件和 Web 服务器。此外,它经常受到软件开发人员的青睐用作编码的平台。
As with any operating system, cybersecurity should be a major concern for any
IT professional who works on a Linux system. Because of the large variety of
software running on a Linux system, as well as several different versions of
Linux (called distributions), cybersecurity can be a complicated process that
involves both system users and system administrators.
与任何操作系统一样,网络安全应该是任何在 Linux 系统工作的 IT 专业人员的主要关注点。由于种类繁多的软件在Linux系统上运行,以及若干不同版本的Linux(称为发行版),网络安全可能是一个涉及系统用户和系统管理员的复杂过程。
Regretfully, cybersecurity is often overlooked in books and classes on Linux.
Typically, these forms of learning tend to focus on how to use the Linux system,
and cybersecurity is often mentioned as an afterthought or considered an
advanced topic for highly experienced professionals. This could be because the
authors of these books and classes feel that cybersecurity is a difficult topic to
learn, but ignoring this topic when discussing Linux is a huge mistake.
遗憾的是,在 Linux 的书籍和课程中,网络安全经常被忽视。通常,这些学习形式往往侧重于如何使用Linux系统,而网络安全经常被事后提及或被视为适合经验丰富的专业人士的高级主题。这可能是因为这些书籍和课程的作者认为,网络安全是一个艰难学习的主题,但在讨论Linux时忽略这个话题是一个巨大的错误。
Why is cybersecurity such an important topic when learning Linux? One reason
is that Linux is a true multiuser operating system. This means that even regular
users (end users) need to know how to keep their own data secure from other
users.
为什么在学习Linux时网络安全如此重要?原因之一在于Linux 是一个真正的多用户操作系统。这意味着,即使是一般用户(最终用户)也需要知道如何保护自己的数据安全并防止其他用户。
Another reason why cybersecurity is critical is because most Linux operating
systems provide a great number of network-based services that are often exposed
to the Internet. The prying eyes of millions of people worldwide need to be
considered when securing a personal Linux system or the Linux systems for an
entire organization.
网络安全之所以至关重要,另一个原因是大多数 Linux 操作系统提供大量基于网络的服务,这些服务经常暴露到互联网。在保护个人 Linux 系统或整个组织 Linux 系统时需要考虑全世界数百万人的窥探。
Our goal with this book is to provide you with the skills a Linux professional
should have. The approach we take is a typical “ground-up” approach, but with
the unique methodology of always keeping an eye on security. Throughout this
book, you will find references to security issues. Entire sections are devoted to
security, and a strong emphasis is placed on creating security policies.
本书的目标是为您提供 Linux 专业人员应该有的技能。我们采取的方法是典型的"由下到上"方法,但始终关注安全性的独特方法。贯穿此书,你会发现有关安全问题的参考。整个部分都致力于安全,并特别强调创建安全策略。
Linux is a very large topic, and it is really impossible to cover it entirely in one
book. The same is true regarding Linux security. We have made every effort to
provide as much detail as possible, but we also encourage you to explore on your
own to learn more about each topic introduced in this book.
Linux是一个非常大的主题,它真的不可能在一本书中完全覆盖。在Linux安全性方面也是如此。我们已尽一切努力提供尽可能多的细节,但我们也鼓励你自己探索以了解更多关于本书介绍的每个主题。
Thank you, and enjoy your Linux cybersecurity journey.
谢谢,享受您的 Linux 网络安全之旅。
第一部分:介绍Linux
第 1 章:分布和关键组件
第 2 章:在命令行上工作
第 3 章:获取帮助
第 4 章:编辑文件
第五章:事情出错时
第二部分:使用 r 和组帐户
第 6 章:管理集团账户
第 7 章:管理用户帐户
第 8 章:制定帐户安全策略
第三部分:文件和数据存储
第 9 章:文件权限
第 10 章:管理本地存储:基本要素
第 11 章:管理本地存储:高级功能
第 12 章:管理网络存储
第 13 章:制定存储安全策略
第四部分:自动化
第14章:裙带关系
第 15 章:脚本编写
第 16 章:常见自动化任务
第 17 章:制定自动化安全策略
第五部分:网络
第 18 章:网络基础知识
第 19 章:网络配置
第 20 章:网络服务配置:基本服务
第 21 章:网络服务配置:Web 服务
第 22 章:连接到远程系统
第 23 章:制定网络安全策略
第六部分:流程和日志管理
第24章:过程控制
第 25 章:系统日志记录
第七部分:软件管理
第 26 章:红帽+基于软件管理
第 27 章:基于 Debian 的软件管理
第 28 章:系统启动
第 29 章:制定软件管理安全策略
第八部分:安全任务
第30章:足迹
第 31 章:防火墙
第 32 章:入侵检测
第 33 章:其他安全任务