Book description
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts:
- Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security.
- Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security.
- Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming.
- Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing.
- Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security.
- Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research.
Publisher resources
Table of contents
- Practical Unix & Internet Security, 3rd Edition
- A Note Regarding Supplemental Files
- Preface
-
I. Computer Security Basics
- 1. Introduction: Some Fundamental Questions
- 2. Unix History and Lineage
-
3. Policies and Guidelines
- Planning Your Security Needs
- Risk Assessment
- Cost-Benefit Analysis and Best Practices
- Policy
- Compliance Audits
- Outsourcing Options
- The Problem with Security Through Obscurity
- Summary
-
II. Security Building Blocks
- 4. Users, Passwords, and Authentication
- 5. Users, Groups, and the Superuser
-
6. Filesystems and Security
- Understanding Filesystems
- File Attributes and Permissions
- chmod: Changing a File’s Permissions
- The umask
- SUID and SGID
- Device Files
- Changing a File’s Owner or Group
- Summary
- 7. Cryptography Basics
-
8. Physical Security for Servers
- Planning for the Forgotten Threats
- Protecting Computer Hardware
- Preventing Theft
- Protecting Your Data
- Story: A Failed Site Inspection
- Summary
- 9. Personnel Security
-
III. Network and Internet Security
- 10. Modems and Dialup Security
- 11. TCP/IP Networks
-
12. Securing TCP and UDP Services
- Understanding Unix Internet Servers and Services
- Controlling Access to Servers
-
Primary Unix Network Services
- echo and chargen (TCP and UDP Ports 7 and 19)
- systat (TCP Port 11)
- FTP: File Transfer Protocol (TCP Ports 20 and 21)
- SSH: The Secure Shell (TCP Port 22)
- Telnet (TCP Port 23)
- SMTP: Simple Mail Transfer Protocol (TCP Port 25)
- TACACS and TACACS+ (UDP Port 49)
- Domain Name System (DNS) (TCP and UDP Port 53)
- BOOTP: Bootstrap Protocol, and DHCP: Dynamic Host Configuration Protocol (UDP Ports 67 and 68)
- TFTP: Trivial File Transfer Protocol (UDP Port 69)
- finger (TCP Port 79)
- HTTP, HTTPS: HyperText Transfer Protocol (TCP Ports 80, 443)
- POP, POPS: Post Office Protocol, and IMAP, IMAPS: Internet Message Access Protocol (TCP Ports 109, 110, 143, 993, 995)
- Sun RPC’s portmapper (UDP and TCP Ports 111)
- Identification Protocol (TCP Port 113)
- NNTP: Network News Transport Protocol (TCP Port 119)
- NTP: Network Time Protocol (UDP Port 123)
- SNMP: Simple Network Management Protocol (UDP Ports 161 and 162)
- rexec (TCP Port 512)
- rlogin and rsh (TCP Ports 513 and 514)
- RIP Routed: Routing Internet Protocol (UDP Port 520)
- The X Window System (TCP Ports 6000-6063)
- RPC rpc.rexd (TCP Port 512)
- Communicating with MUDs, Internet Relay Chat (IRC), and Instant Messaging
- Managing Services Securely
- Putting It All Together: An Example
- Summary
- 13. Sun RPC
- 14. Network-Based Authentication Systems
-
15. Network Filesystems
- Understanding NFS
- Server-Side NFS Security
- Client-Side NFS Security
-
Improving NFS Security
- Limit Exported and Mounted Filesystems
- Export Read-Only
- Use Root Ownership
- Remove Group-Write Permission for Files and Directories
- Do Not Export Server Executables
- Do Not Export Home Directories
- Do Not Allow Users to Log into the Server
- Use fsirand
- Set the portmon Variable
- Use showmount -e
- Use Secure NFS
- Some Last Comments on NFS
- Understanding SMB
- Summary
- 16. Secure Programming Techniques
-
IV. Secure Operations
- 17. Keeping Up to Date
-
18. Backups
-
Why Make Backups?
- The Role of Backups
- What Should You Back Up?
- Types of Backups
- Guarding Against Media Failure
- How Long Should You Keep a Backup?
- Security for Backups
- Legal Issues
- Deciding Upon a Backup Strategy
- Individual Workstation
- Small Network of Workstations and a Server
- Large Service-Based Network with Small Budget
- Large Service-Based Networks with Large Budget
- Backing Up System Files
- Software for Backups
- Summary
-
Why Make Backups?
-
19. Defending Accounts
- Dangerous Accounts
- Monitoring File Format
- Restricting Logins
- Managing Dormant Accounts
- Protecting the root Account
- One-Time Passwords
- Administrative Techniques for Conventional Passwords
- Intrusion Detection Systems
- Summary
- 20. Integrity Management
-
21. Auditing, Logging, and Forensics
- Unix Log File Utilities
- Process Accounting: The acct/pacct File
- Program-Specific Log Files
- Designing a Site-Wide Log Policy
- Handwritten Logs
- Managing Log Files
- Unix Forensics
- Summary
-
V. Handling Security Incidents
-
22. Discovering a Break-in
- Prelude
- Discovering an Intruder
- Cleaning Up After the Intruder
- Case Studies
- Summary
- 23. Protecting Against Programmed Threats
- 24. Denial of Service Attacks and Solutions
- 25. Computer Crime
- 26. Who Do You Trust?
-
22. Discovering a Break-in
-
VI. Appendixes
-
A. Unix Security Checklist
- Preface
- Chapter 1: Introduction: Some Fundamental Questions
- Chapter 2: Unix History and Lineage
- Chapter 3: Policies and Guidelines
- Chapter 4: Users, Passwords, and Authentication
- Chapter 5: Users, Groups, and the Superuser
- Chapter 6: Filesystems and Security
- Chapter 7: Cryptography Basics
- Chapter 8: Physical Security for Servers
- Chapter 9: Personnel Security
- Chapter 10: Modems and Dialup Security
- Chapter 11: TCP/IP Networks
- Chapter 12: Securing TCP and UDP Services
- Chapter 13: Sun RPC
- Chapter 14: Network-Based Authentication Systems
- Chapter 15: Network Filesystems
- Chapter 16: Secure Programming Techniques
- Chapter 17: Keeping Up to Date
- Chapter 18: Backups
- Chapter 19: Defending Accounts
- Chapter 20: Integrity Management
- Chapter 21: Auditing, Logging, and Forensics
- Chapter 22: Discovering a Break-In
- Chapter 23: Protecting Against Programmed Threats
- Chapter 24: Denial of Service Attacks and Solutions
- Chapter 25: Computer Crime
- Chapter 26: Who Do You Trust?
- Appendix A: Unix Security Checklist
- Appendix B: Unix Processes
- Appendixes C, D, and E: Paper Sources, Electronic Sources, and Organizations
- B. Unix Processes
-
C. Paper Sources
- Unix Security References
-
Other Computer References
- Computer Crime and Law
- Computer-Related Risks
- Computer Viruses and Programmed Threats
- Cryptography Books
- Cryptography Papers and Other Publications
- General Computer Security
- Network Technology and Security
- Security Products and Services Information
- Understanding the Computer Security “Culture”
- Unix Programming and System Administration
- Miscellaneous References
- Security Periodicals
- D. Electronic Resources
-
E. Organizations
-
Professional Organizations
- Association for Computing Machinery (ACM)
- American Society for Industrial Security (ASIS)
- Computer Security Institute (CSI)
- Electronic Frontier Foundation (EFF)
- Electronic Privacy Information Center (EPIC)
- High Technology Crimes Investigation Association (HTCIA)
- Information Systems Security Association (ISSA)
- International Information Systems Security Certification Consortium, Inc.
- The Internet Society
- IEEE Computer Society
- IFIP, Technical Committee 11
- Systems Administration and Network Security (SANS)
- USENIX/SAGE
- U.S. Government Organizations
- Emergency Response Organizations
-
Professional Organizations
-
A. Unix Security Checklist
- Index
- About the Authors
- Colophon
- Copyright
Product information
- Title: Practical UNIX and Internet Security, 3rd Edition
- Author(s):
- Release date: February 2003
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596003234
You might also like
book
Computer Security Basics, 2nd Edition
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, …
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
video
Linux Security and Hardening, The Practical Security Guide
Keep yourself and your company out of the news by protecting your Linux systems from hackers, …
book
Hands-on Booting: Learn the Boot Process of Linux, Windows, and Unix
Master the booting procedure of various operating systems with in-depth analysis of bootloaders and firmware. The …