+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Linux Security Fundamentals. Edition No. 1

  • Book

  • 192 Pages
  • December 2020
  • John Wiley and Sons Ltd
  • ID: 5185786

Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.

This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include:

  -      Security Concepts

-       Encryption

-       Node, Device and Storage Security

-       Network and Service Security

-       Identity and Privacy 

Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.

Table of Contents

Introduction xiii

Chapter 1 Using Digital Resources Responsibly 1

Protecting Personal Rights 2

Protecting Digital Privacy 4

What is Personal Data? 4

Where Might My Personal Data Be Hanging Out? 4

What Are My Responsibilities as a Site Administrator? 6

Can Escaped Genies Be Forced Back into Their Bottles? 6

What Can I Do as a User? 7

Establishing Authenticity 7

Think About the Source 8

Be Aware of Common Threat Categories 8

Summary 9

Back to the Basics 10

Review Questions 11

Chapter 2 What Are Vulnerabilities and Threats? 15

The Basics: What Are We Trying to Accomplish Here? 16

What Are Vulnerabilities and Threats? 17

What Can Be Exploited? 17

Who’s Doing the Exploiting? 18

Why Do They Attack? 19

Common Vulnerabilities 20

Software Vulnerabilities 20

Hardware Vulnerabilities 21

Bioware Vulnerabilities 21

Digital Espionage 21

USB Devices 21

Backdoors 22

Wireless Entry Points 22

Stolen Credentials 23

Data Breaches 23

Identity Theft (Besides Breaches) 24

Malware 24

Network-Based Attacks 25

Man-in-the-Middle Attacks 25

Denial-of-Service and Distributed Denial-of-Service Attacks 26

Network Routing Attacks 26

Summary 26

Back to the Basics 27

Review Questions 28

Chapter 3 Controlling Access to Your Assets 33

Controlling Physical Access 34

Understanding Your Devices 34

Protecting Your Devices 36

Managing Authentication Through Effective Password Use 38

Managing Authorization Through Permissions 44

Controlling Network Access 45

Firewalls 45

Virus and Malware Protection 48

Educating Your Users 49

Controlling Software Sources 50

PC Software Repositories 51

Mobile Package Management 51

Summary 52

Back to the Basics 52

Review Questions 54

Chapter 4 Controlling Network Connections 59

Understanding Network Architecture 60

The Transmission Control Protocol 60

The Internet Protocol 61

Understanding the Domain Name System 64

Auditing Networks 65

Network Auditing Tools 66

Automating Audits 70

Securing Networks 71

Patch Your Software 71

Physically Secure Your Infrastructure 73

Secure Your Network Behavior 73

Other Stuff 74

Summary 74

Back to the Basics 75

Review Questions 76

Chapter 5 Encrypting Your Data at Rest 81

What is Encryption? 82

Encryption Usage Patterns 85

What Should You Encrypt? 85

Understanding Hashing vs. Encryption 86

What Are Blockchains? 86

Encryption Technologies 87

Summary 89

Back to the Basics 89

Review Questions 90

Chapter 6 Encrypting Your Moving Data 93

Website Encryption 94

Why You Should Use Encryption 95

How Website Encryption Works 96

Generating Certificates 98

Email Encryption 99

GNU Privacy Guard 100

Does Gmail Encrypt Your Emails? 100

Working with VPN Connections and Software Repositories 100

Securing Your Actions Using VPNs 101

Securing Transfers from Software Repositories 104

Summary 105

Back to the Basics 105

Review Questions 106

Chapter 7 Risk Assessment 109

Conducting Open Source Intelligence Gathering 111

Accessing Public Vulnerability Databases 112

Vulnerability Data Frameworks 112

Vulnerability Data Formats 113

Vulnerability Data Metrics 114

Vulnerability Data Management Tools 114

Conducting Vulnerability Scans 115

Conducting Penetration Tests 117

Attack Vectors 118

Tooling Frameworks 118

Follow-Up 119

Summary 119

Back to the Basics 120

Review Questions 121

Chapter 8 Configuring System Backups and Monitoring 125

Why You Need to Get Backups Right the First Time 127

Appreciating the Risks 128

Spreading Your Backups Across Multiple Sites 129

Testing Your Backups 130

Meeting Regulatory Compliance 131

Backup Types 132

Incremental Backups 132

Differential Backups 133

Backup Life Cycles 133

Multitier Backups 133

Multisite Storage Solutions 134

Disaster Recovery Planning 134

Configuring Monitoring and Alerts 135

Working with System Logs 135

Intrusion Detection 136

Summary 137

Back to the Basics 138

Review Questions 139

Chapter 9 Resource Isolation Design Patterns 143

Configuring Network Firewalling 145

Balancing Public and Private Networks 145

Building Isolated Development Environments 147

Working with Sandbox Environments 148

Use Cases for Sandboxes 148

Sandbox Designs 149

Controlling Local System Access 150

Configuring Mandatory Access Controls 150

Setting Usage Quotas 151

Summary 152

Back to the Basics 152

Review Questions 153

Appendix Answers to Review Questions 155

Chapter 1: Using Digital Resources Responsibly 156

Chapter 2: What are Vulnerabilities and Threats? 157

Chapter 3: Controlling Access to Your Assets 158

Chapter 4: Controlling Network Connections 160

Chapter 5: Encrypting Your Data at Rest 161

Chapter 6: Encrypting Your Moving Data 162

Chapter 7: Risk Assessment 163

Chapter 8: Configuring System Backups and Monitoring 165

Chapter 9: Resource Isolation Design Patterns 166

Index 167

Authors

David Clinton