Red Hat Linux 8.0
The Official Red Hat Linux Security Guide
Copyright
© 2002 by Red Hat, Inc.
ISBN: N/A
Table of Contents
Introduction
Document Conventions
More to Come
Send in Your Feedback
I.
A General Introduction to Security
1.
Security Overview
What is Computer Security?
Security Controls
Conclusion
2.
Attackers and Risks
Hackers and Crackers
Threats To Network Security
Threats To Server Security
Threats To Workstation and Home PC Security
II.
Configuring Red Hat Linux for Security
3.
Security Updates
Using Red Hat Network
Using the Errata Website
4.
Workstation Security
Evaluating Workstation Security
BIOS and Boot Loader Security
Password Security
Administrative Controls
Available Network Services
Personal Firewalls
Security Enhanced Communication Tools
5.
Server Security
Securing Services With TCP Wrappers and
xinetd
Securing Portmap
Securing NIS
Securing NFS
Securing Apache HTTP Server
Securing FTP
Securing Sendmail
Verifying Which Ports Are Listening
6.
Virtual Private Networks
VPNs and Red Hat Linux
Crypto IP Encapsulation (CIPE)
7.
Firewalls
Netfilter and
iptables
ip6tables
Additional Resources
8.
Hardware and Network Protection
Secure Network Topologies
Hardware Security
III.
Assessing Your Security
9.
Vulnerability Assessment
Thinking Like the Enemy
Defining Assessment and Testing
Evaluating the Tools
IV.
Intrusions and Incident Response
10.
Intrusion Detection
Defining Intrusion Detection Systems
Host-based IDS
Network-based IDS
11.
Incident Response
Defining Incident Response
Creating an Incident Response Plan
Implementing the Incident Response Plan
Investigating the Incident
Restoring and Recovering Resources
Reporting the Incident
V.
Appendixes
A.
Common Exploits and Attacks
Index
Colophon
Next
Introduction