Hardening Linux

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvp
Bulletproof your system before you are hacked! From the publisher of the international best-seller, Hacking Exposed , here is a brilliant new offering written with a passion for security that will help you make the necessary upgrades and take the essential steps to secure your Linux systems. The concise and consistent approach breaks down security into logical parts, giving you actions to take immediately, information on hardening your system from the top down, how to plan and maintain an interative security strategy and finally, how to navigate the "soft issues" of how to garner management and employee support for your security strategy. Features examples in the most frequently used enterprise Linux distributions, Red Hat Enterprise Server 3.0, SuSE SLES 8.1 and a sneak preview of SuSE SLES 9.0
http://rapidshare.com/files/52217963/0072254971.zip
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. Key FeaturesLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much moreMaster the art of securing a Linux environment with this end-to-end practical guideBook Description This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise. What you will learnUse various techniques to prevent intruders from accessing sensitive dataPrevent intruders from planting malware, and detect whether malware has been plantedPrevent insiders from accessing data that they aren't authorized to accessDo quick checks to see whether a computer is running network services that it doesn't need to runLearn security techniques that are common to all Linux distros, and some that are distro-specificWho This Book Is For If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory. Table of ContentsRunning Linux in a virtual environmentSecuring user accountsSecuring your server with a FirewallEncrypting and SSH HardeningMastering Discretionary Access ControlAccess Control Lists and Shared Directory ManagementImplementing Mandatory Access Control with SELinux and AppArmorScanning, Auditing and HardeningVulnerability Scanning and Intrusion DetectionSecurity Tips & Tricks for the Busy Bee
Cisco IOS 15.xx 的安全加固。 Table of Contents Table of Contents .................................................................................................................................................. 2 Overview .................................................................................................................................................................. 7 Intended Audience ........................................................................................................................................... 7 Consensus Guidance ........................................................................................................................................ 7 Typographical Conventions ......................................................................................................................... 8 Scoring Information ........................................................................................................................................ 8 Profile Definitions ............................................................................................................................................ 9 Acknowledgements ...................................................................................................................................... 10 Recommendations ............................................................................................................................................. 11 1 Management Plane .................................................................................................................................... 11 1.1 Local Authentication, Authorization and Accounting (AAA) Rules ............................... 11 1.1.1 Enable 'aaa new-model' (Scored) ....................................................................................... 12 1.1.2 Enable 'aaa authentication login' (Scored) ..................................................................... 14 1.1.3 Enable 'aaa authentication enable default' (Scored) .................................................. 16 1.1.4 Set 'login authentication for 'line con 0' (Scored) ........................................................ 17 1.1.5 Set 'login authentication for 'line tty' (Scored) ............................................................. 19 1.1.6 Set 'login authentication for 'line vty' (Scored) ............................................................ 21 1.1.7 Set 'aaa accounting' to log all privileged use commands using 'commands 15' (Scored) ................................................................................................................................................... 23 1.1.8 Set 'aaa accounting connection' (Scored) ........................................................................ 24 1.1.9 Set 'aaa accounting exec' (Scored) ..................................................................................... 26 1.1.10 Set 'aaa accounting network' (Scored) .......................................................................... 28 1.1.11 Set 'aaa accounting system' (Scored) ............................................................................. 30 1.2 Access Rules ........................................................................................................................................ 31 1.2.1 Set 'privilege 1' for local users (Scored) .......................................................................... 32 1.2.2 Set 'transport input ssh' for 'line vty' connections (Scored) .................................... 33 1.2.3 Set 'no exec' for 'line aux 0' (Scored) ................................................................................ 34 1.2.4 Create 'access-list' for use with 'line vty' (Not Scored) .............................................. 36 1.2.5 Set 'access-class' for 'line vty' (Scored) ............................................................................ 38
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值