home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 6.7 Encryption and U.S. Law Part III Next: 7. Backups
 

Part III: System Security

This part of the book is directed primarily towards the UNIX system administrator. It describes how to configure UNIX on your computer to minimize the chances of a break-in, as well as to limit the opportunities for a nonprivileged user to gain superuser access.

  • Chapter 7, Backups , discusses how and why to make archival backups of your storage. It includes discussions of backup strategies for different types of organizations.

  • Chapter 8, Defending Your Accounts , describes ways that a computer cracker might try to initially break into your computer system. By knowing these "doors" and closing them, you increase the security of your system.

  • Chapter 9, Integrity Management , discusses how to monitor your filesystem for unauthorized changes. This includes coverage of the use of message digests and read-only disks, and the configuration and use of the Tripwire utility.

  • Chapter 10, Auditing and Logging , discusses the logging mechanisms that UNIX provides to help you audit the usage and behavior of your system.

  • Chapter 11, Protecting Against Programmed Threats , is about computer viruses, worms, and Trojan horses. This chapter contains detailed tips that you can use to protect yourself from these electronic vermin.

  • Chapter 12, Physical Security . What if somebody gets frustrated by your super-secure system and decides to smash your computer with a sledgehammer? This chapter describes physical perils that face your computer and its data and discusses ways of protecting them.

  • Chapter 13, Personnel Security , examines concerns about who you employ and how they fit into your overall security scheme.