Linux Security Fundamentals. David Higby Clinton
Чтение книги онлайн.

Читать онлайн книгу Linux Security Fundamentals - David Higby Clinton страница 2

СКАЧАТЬ Basics Review Questions

      9  Chapter 2 What Are Vulnerabilities and Threats? The Basics: What Are We Trying to Accomplish Here? Common Vulnerabilities Digital Espionage Stolen Credentials Malware Network-Based Attacks Summary Back to the Basics Review Questions

      10  Chapter 3 Controlling Access to Your Assets Controlling Physical Access Controlling Network Access Controlling Software Sources Summary Back to the Basics Review Questions

      11  Chapter 4 Controlling Network Connections Understanding Network Architecture Auditing Networks Securing Networks Summary Back to the Basics Review Questions

      12  Chapter 5 Encrypting Your Data at Rest What Is Encryption? Encryption Usage Patterns Encryption Technologies Summary Back to the Basics Review Questions

      13  Chapter 6 Encrypting Your Moving Data Website Encryption Email Encryption Working with VPN Connections and Software Repositories Summary Back to the Basics Review Questions

      14  Chapter 7 Risk Assessment Conducting Open Source Intelligence Gathering Accessing Public Vulnerability Databases Conducting Vulnerability Scans Conducting Penetration Tests Summary Back to the Basics Review Questions

      15  Chapter 8 Configuring System Backups and Monitoring Why You Need to Get Backups Right the First Time Backup Types Multitier Backups Configuring Monitoring and Alerts Summary Back to the Basics Review Questions

      16  Chapter 9 Resource Isolation Design Patterns Configuring Network Firewalling Working with Sandbox Environments Controlling Local System Access Summary Back to the Basics Review Questions

      17  Appendix Answers to Review Questions Chapter 1: Using Digital Resources Responsibly Chapter 2: What are Vulnerabilities and Threats? Chapter 3: Controlling Access to Your Assets Chapter 4: Controlling Network Connections Chapter 5: Encrypting Your Data at Rest Chapter 6: Encrypting Your Moving Data Chapter 7: Risk Assessment Chapter 8: Configuring System Backups and Monitoring Chapter 9: Resource Isolation Design Patterns

      18  Index

      19  End User License Agreement

       List of Illustrations СКАЧАТЬ