Linux Security Fundamentals
Home > Computing and Information Technology > Operating systems > Open source and other operating systems > Linux > Linux Security Fundamentals
Linux Security Fundamentals

Linux Security Fundamentals


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them. This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include: Security Concepts Encryption Node, Device and Storage Security Network and Service Security Identity and Privacy Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.

Table of Contents:
Introduction xiii Chapter 1 Using Digital Resources Responsibly 1 Protecting Personal Rights 2 Protecting Digital Privacy 4 What is Personal Data? 4 Where Might My Personal Data Be Hanging Out? 4 What Are My Responsibilities as a Site Administrator? 6 Can Escaped Genies Be Forced Back into Their Bottles? 6 What Can I Do as a User? 7 Establishing Authenticity 7 Think About the Source 8 Be Aware of Common Threat Categories 8 Summary 9 Back to the Basics 10 Review Questions 11 Chapter 2 What Are Vulnerabilities and Threats? 15 The Basics: What Are We Trying to Accomplish Here? 16 What Are Vulnerabilities and Threats? 17 What Can Be Exploited? 17 Who’s Doing the Exploiting? 18 Why Do They Attack? 19 Common Vulnerabilities 20 Software Vulnerabilities 20 Hardware Vulnerabilities 21 Bioware Vulnerabilities 21 Digital Espionage 21 USB Devices 21 Backdoors 22 Wireless Entry Points 22 Stolen Credentials 23 Data Breaches 23 Identity Theft (Besides Breaches) 24 Malware 24 Network-Based Attacks 25 Man-in-the-Middle Attacks 25 Denial-of-Service and Distributed Denial-of-Service Attacks 26 Network Routing Attacks 26 Summary 26 Back to the Basics 27 Review Questions 28 Chapter 3 Controlling Access to Your Assets 33 Controlling Physical Access 34 Understanding Your Devices 34 Protecting Your Devices 36 Managing Authentication Through Effective Password Use 38 Managing Authorization Through Permissions 44 Controlling Network Access 45 Firewalls 45 Virus and Malware Protection 48 Educating Your Users 49 Controlling Software Sources 50 PC Software Repositories 51 Mobile Package Management 51 Summary 52 Back to the Basics 52 Review Questions 54 Chapter 4 Controlling Network Connections 59 Understanding Network Architecture 60 The Transmission Control Protocol 60 The Internet Protocol 61 Understanding the Domain Name System 64 Auditing Networks 65 Network Auditing Tools 66 Automating Audits 70 Securing Networks 71 Patch Your Software 71 Physically Secure Your Infrastructure 73 Secure Your Network Behavior 73 Other Stuff 74 Summary 74 Back to the Basics 75 Review Questions 76 Chapter 5 Encrypting Your Data at Rest 81 What is Encryption? 82 Encryption Usage Patterns 85 What Should You Encrypt? 85 Understanding Hashing vs. Encryption 86 What Are Blockchains? 86 Encryption Technologies 87 Summary 89 Back to the Basics 89 Review Questions 90 Chapter 6 Encrypting Your Moving Data 93 Website Encryption 94 Why You Should Use Encryption 95 How Website Encryption Works 96 Generating Certificates 98 Email Encryption 99 GNU Privacy Guard 100 Does Gmail Encrypt Your Emails? 100 Working with VPN Connections and Software Repositories 100 Securing Your Actions Using VPNs 101 Securing Transfers from Software Repositories 104 Summary 105 Back to the Basics 105 Review Questions 106 Chapter 7 Risk Assessment 109 Conducting Open Source Intelligence Gathering 111 Accessing Public Vulnerability Databases 112 Vulnerability Data Frameworks 112 Vulnerability Data Formats 113 Vulnerability Data Metrics 114 Vulnerability Data Management Tools 114 Conducting Vulnerability Scans 115 Conducting Penetration Tests 117 Attack Vectors 118 Tooling Frameworks 118 Follow-Up 119 Summary 119 Back to the Basics 120 Review Questions 121 Chapter 8 Configuring System Backups and Monitoring 125 Why You Need to Get Backups Right the First Time 127 Appreciating the Risks 128 Spreading Your Backups Across Multiple Sites 129 Testing Your Backups 130 Meeting Regulatory Compliance 131 Backup Types 132 Incremental Backups 132 Differential Backups 133 Backup Life Cycles 133 Multitier Backups 133 Multisite Storage Solutions 134 Disaster Recovery Planning 134 Configuring Monitoring and Alerts 135 Working with System Logs 135 Intrusion Detection 136 Summary 137 Back to the Basics 138 Review Questions 139 Chapter 9 Resource Isolation Design Patterns 143 Configuring Network Firewalling 145 Balancing Public and Private Networks 145 Building Isolated Development Environments 147 Working with Sandbox Environments 148 Use Cases for Sandboxes 148 Sandbox Designs 149 Controlling Local System Access 150 Configuring Mandatory Access Controls 150 Setting Usage Quotas 151 Summary 152 Back to the Basics 152 Review Questions 153 Appendix Answers to Review Questions 155 Chapter 1: Using Digital Resources Responsibly 156 Chapter 2: What are Vulnerabilities and Threats? 157 Chapter 3: Controlling Access to Your Assets 158 Chapter 4: Controlling Network Connections 160 Chapter 5: Encrypting Your Data at Rest 161 Chapter 6: Encrypting Your Moving Data 162 Chapter 7: Risk Assessment 163 Chapter 8: Configuring System Backups and Monitoring 165 Chapter 9: Resource Isolation Design Patterns 166 Index 167

About the Author :
David Clinton is a Linux server admin and Amazon Web Services solutions architect who has worked with IT infrastructure in both academic and enterprise environments. He has created video courses teaching AWS and Linux administration, server virtualization, and IT security for Pluralsight. He has also written or cowritten a dozen technology books, including AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam, Second Edition, and AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam.


Best Sellers


Product Details
  • ISBN-13: 9781119781462
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Height: 234 mm
  • No of Pages: 192
  • Returnable: N
  • Weight: 318 gr
  • ISBN-10: 1119781469
  • Publisher Date: 28 Dec 2020
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 13 mm
  • Width: 185 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Linux Security Fundamentals
John Wiley & Sons Inc -
Linux Security Fundamentals
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Linux Security Fundamentals

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!