This part of the book is directed primarily towards the UNIX
system administrator. It describes how to configure UNIX on your
computer to minimize the chances of a break-in, as well as to limit
the opportunities for a nonprivileged user to gain superuser access.
-
Chapter 7,
Backups
, discusses how
and why to make archival backups of your storage. It includes discussions
of backup strategies for different types of organizations.
-
Chapter 8,
Defending Your Accounts
, describes ways that a
computer cracker might try to initially break into your computer
system. By knowing these "doors" and closing them,
you increase the security of your system.
-
Chapter 9,
Integrity Management
, discusses how to monitor
your filesystem for unauthorized changes. This includes coverage
of the use of message digests and read-only disks, and the configuration
and use of the Tripwire utility.
-
Chapter 10,
Auditing and Logging
, discusses the logging mechanisms
that UNIX provides to help you audit the usage and behavior of your
system.
-
Chapter 11,
Protecting Against Programmed Threats
, is about
computer viruses, worms, and Trojan horses. This chapter contains
detailed tips that you can use to protect yourself from these electronic
vermin.
-
Chapter 12,
Physical Security
. What if somebody gets frustrated
by your super-secure system and decides to smash your computer with
a sledgehammer? This chapter describes physical perils that face
your computer and its data and discusses ways of protecting them.
-
Chapter 13,
Personnel Security
, examines concerns about who
you employ and how they fit into your overall security scheme.
|
|