Security Strategies in Linux Platforms and Applications (Jones & Bartlett Learning Information Systems Security & Assurance) 2nd Edition, (Ebook PDF) - The ebook in PDF format with all chapters is ready for download
Security Strategies in Linux Platforms and Applications (Jones & Bartlett Learning Information Systems Security & Assurance) 2nd Edition, (Ebook PDF) - The ebook in PDF format with all chapters is ready for download
Preface
xix
xx Preface
however, there are risks associated as well. Fortunately, a large community is built
around improving Linux and the various software packages that go into it. This includes
the National Security Agency (NSA), which initially developed a set of security exten-
sions that has since been implemented into the Linux kernel itself.
When you are finished with this book, you will understand the importance of custom
firewalls, restrictions on key services, golden baseline systems, and custom local reposi-
tories. You will even understand how to customize and recompile the Linux kernel.
You will be able to use open source and commercial tools to test the integrity of various
systems on the network. The data you get from such tools will identify weaknesses and
help you create more secure systems.
Learning Features
The writing style of this book is practical and conversational. Each chapter begins with
a statement of learning objectives. Step-by-step examples of information security concepts
and procedures are presented throughout the text. Illustrations are used both to clarify
the material and to vary the presentation. The text is sprinkled with notes, tips, FYIs,
warnings, and sidebars to alert the reader to additional helpful information related to the
subject under discussion. Chapter assessments appear at the end of each chapter, with
solutions provided in the back of the book.
Throughout this book are references to commands and directives. They may be
included in the body of a paragraph in a monospaced font, like this: apt-get update.
Other commands or directives may be indented between paragraphs, like the directive
shown here:
deb http://us.archive.ubuntu.com/ubuntu/ lucid main restricted
Sometimes, the command or directive is so long, it has to be broken into multiple lines due
to the formatting requirements of this book. Line wraps are indicated by a curved arrow,
as is shown at the start of what looks like the second line of the iptables command.
It is just a continuation arrow, which would be typed as a continuous command on the
command line or an appropriate configuration file.
iptables -A RH-Firewall-1-INPUT -i eth0 -s 10.0.0.0/8
-j LOG --log-prefix “Dropped private class A addresses”.
Preface xxi
Chapter summaries are included in the text to provide a rapid review of the material and
to help students understand the relative importance of the concepts presented.
Audience
The material is suitable for undergraduate or graduate computer science majors or
information science majors, students at a two-year technical college or community college
who have a basic technical background, or readers who have a basic understanding
of IT security and want to expand their knowledge. It assumes basic knowledge of Linux
administration at the command-line interface.
© Rodolfo Clix/Dreamstime.com
Acknowledgments
I would like to thank Jones & Bartlett Learning and David Kim of Security Evolutions
for the opportunity to write this book and be a part of the Information Systems Security
& Assurance Series project. This book required a more substantial team effort than ordinary
book projects. I would also like to thank the amazing project manager, Kim Lindros;
the top-notch technical reviewer, Mike Chapple; the sharp copy editor, Kate Shoup;
the marvelous compositor, Mia Saunders; the eagle-eyed proofreader, Ruth Walker;
and Larry Goodrich along with Angela Silvia of High Stakes Writing for facilitating
the entire process.
In addition, I acknowledge the gracious help of Billy Austin of the SAINT corporation,
along with Mike Johnson of AccessData with respect to their products. The author also
acknowledges the fortitude of Linux security professionals everywhere, white-hat hackers
at heart who have to deal with cultural biases from the mainstream security community
along with the legitimate fears of the open source community.
Most importantly, I could not do what I do without the help and support of my wife,
Donna. She makes everything possible for me.
Michael Jang
Writing any book is a process. Revising an existing book for a second edition is also a
process. It takes a team of people to get from conception to completion. Thanks to Mike,
Kate, Mia, Larry, and everyone else who helped get this second edition to the goal line.
Mostly, I’d like to acknowledge all those people who jump into things without any
idea what they are getting themselves into. This fearlessness is the best way to jump
into something new and guarantee that you are going to learn a lot. Try it some time
if you haven’t already.
Ric Messier
xxiii
About the Authors
MICHAEL JANG is a full-time writer, specializing in Linux and related certifications.
His experience with computers dates back to the days of badly shuffled punch cards. He
has written books such as RHCE Red Hat Certified Engineer Study Guide, LPIC-1 In Depth,
Ubuntu Server Administration, and Linux Annoyances for Geeks. He is also the author of
numerous video courses, and teaches preparation courses on Red Hat certification.
RIC MESSIER has been working with Unix and Unix-like operating systems since the
mid-1980s. In the intervening decades, he has done system administration, network
engineering, penetration testing, and programming; developed managed security services;
and worked in operations security and a number of other jobs in between.
Ric is a security professional who has worked with a number of companies from large
Internet service providers to small software companies. He has run a small networking
and security consulting practice for the last several years. Additionally, he has taught
courses at both the graduate and undergraduate level. Currently, in addition to writing
books and recording training videos, he is the program director for Cyber Security and
Digital Forensics at Champlain College in Burlington, Vt. He also maintains a blog
on information security and digital forensics at securitykilroy.blogspot.com.
PA R T O N E
C. L. S. C. MOTTOES.
“We Study the Word and the Works of God.”—“Let us keep our
Heavenly Father in the Midst.”—“Never be Discouraged.”
C. L. S. C. MEMORIAL DAYS.
1. Opening Day—October 1.
2. Bryant Day—November 3.
3. Special Sunday—November, second Sunday.
4. Milton Day—December 9.
5. College Day—January, last Thursday.
6. Special Sunday—February, second Sunday.
7. Founder’s Day—February 23.
8. Longfellow Day—February 27.
9. Shakspere Day—April 23.
10. Addison Day—May 1.
11. Special Sunday—May, second Sunday.
12. Special Sunday—July, second Sunday.
13. Inauguration Day—August, first Saturday after first Tuesday;
anniversary of C. L. S. C. at Chautauqua.
14. St. Paul’s Day—August, second Saturday after first Tuesday;
anniversary of the dedication of St. Paul’s Grove at Chautauqua.
15. Commencement Day—August, third Tuesday.
16. Garfield Day—September 19.
OFFICERS.
President—J. B. Underwood, Meriden, Conn.
Vice President—C. M. Nichols, Springfield, Ohio.
Treasurer—Miss Carrie Hart, Aurora, Ind.
Secretary—Miss M. M. Canfield, Washington, D. C.
Executive Committee—Officers of the class.
There will be excursions from Chautauqua to Niagara Falls every few days during the
season, and there will be no difficulty in securing ample and satisfactory accommodations
for the class of 1885, or any portion of it.
The challenge of our classmate in Kansas brings forth the following from Maryland: “I
see in the May Chautauquan a chivalric old gentleman hailing from Kansas, claiming to be
the oldest member of the class—being born in the year the battle of Waterloo was
fought. Now, I have entered on my seventy-fifth summer, and remember distinctly the
battle of Waterloo. But, he claims also to be the youngest. Now, if I shall have the
pleasure of meeting him at Chautauqua, and he is so disposed, we will run a foot race.
But, really, this is the time for ‘grave and reverend seigniors’ to speak out. Who comes
next?”
Nebraska.—I trust that I shall be numbered with those who shall “pass under the
Arches” at dear Chautauqua this summer, thereby proving that I am one who is earnestly
striving to “Press on, reaching after those things which are before.” The C. L. S. C. means
a great deal to me. These magic letters are the key which unlocks all the enthusiasm of
my being. These four years have been a new revelation to me, and have been of deep,
abiding interest, and a well-spring of joy. Last year my dearest friend, a devoted
Chautauquan, a member of the class of ’85, a thorough “Invincible,” in every sense
where right was involved, went on before. Since that time I have read alone, but hope to
be one of the successful many who shall pass under the Arches and “begin” again,
instead of ending on Commencement day.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookmass.com