This part of the book contains instructions for what to do if your
computer's security is compromised. These chapters will also help
system administrators protect their systems from authorized users who
are misusing their privileges.
-
Chapter 24,
Discovering a Break-in
, contains step-by-step directions to
follow if you discover that an unauthorized person is using your computer.
-
Chapter 25,
Denial of Service Attacks and Solutions
, describes ways that legitimate,
authorized users can make your system inoperale, ways that you can
find out who is doing what, and what to do about it.
-
Chapter 26,
Computer Security and U.S. Law
. Occasionally the only thing you can do
is sue or try to have your attackers thrown into jail. This chapter
describes the legal recourse you may have after a security breach and
discusses why legal approaches are often not helpful. It also covers
some emerging concerns about running server sites connected to a wide
area network such as the internet.
-
Chapter 27,
Who Do You Trust?
, is a conluding chapter that makes the
point that somewhere along the line, you need to trust a few things and
people in order to sleep at night. Are you trusting the right ones?
|
|