Book description
Solaris 8 Security covers all the concepts and issues Solaris 8 administrators need to know in order to make and keep their Solaris 8 systems secure. This includes not only Solaris 8 security tools and features, but such subjects as cryptography and defenses against known attacks and vulnerabilities.
Readers learn practical, command-level defenses, such as:
How to configure a secure DNS server
What to do with /etc/inet/inetd.conf
How to make IPsec work
Why DES fails
How to identify and prevent system compromises
How not to configure sendmail
How to automate security checkups
The book provides a proactive approach to security. Coverage includes intrusion detection systems, network-level filtering, firewalls and other network-level systems.
Table of contents
- Copyright
- About the Author
- About the Technical Reviewers
- Acknowledgments
- Tell Us What You Think
- Preface
-
Enterprise Security Framework
- Chapter 2: Security and Cryptography
- Chapter 3: System Security
- Chapter 4: Authentication and Authorization
- Chapter 5: Kerberos
- Chapter 6: Auditing and Accounting
- Chapter 7: Open Source Security Tools
- Chapter 8: Network Security
- Chapter 9: IP Security Architecture (IPsec)
- Chapter 10: Securing Network Services
- Appendixes
- Security Principles
- The Security Process
- Risk Management
- Calculating Risk
- Defining Security Policy
- Design Vulnerabilities
- Implementation Vulnerabilities
- Ascertaining Your Security Requirements
- Management Issues
- Justifying Investing in Security
- Security Training
- Security Perimeter Problems
- Access Control Models
- Low-Cost But Effective Security Measures
- Handling Security Incidents
- Evaluating the Efficiency of Security Measures
- Human Factors
- Social Engineering
- Remote-Access Control
- UNIX and Security
- Password Selection and Use
- Security for Business
- Summary
- Security and Cryptography
- System Security
- Authentication and Authorization
-
Kerberos
- What Does Kerberos Mean?
- A Brief History of Kerberos
- Kerberos and Solaris 8
- Kerberos Limitations
- Do You Need Kerberos?
- Planning Kerberos Deployment
- The Differences Between Kerberos 4 and 5
- How Does Kerberos Work?
- Configuring Kerberos
- Kerberos and the Network File System (NFS)
- Troubleshooting Kerberos
- Alternatives to Kerberos
- Summary
- Auditing and Accounting
-
Open Source Security Tools
- OpenSSH: Open Secure Shell
- OpenSSL: Open Secure Sockets Layer Library and Tool
- Nessus: Remote System Security Scanner
- nmap: Network-Mapping and Port-Scanning Tool
- sudo: Controlled su
- lsof: List Open Files
- ntop: Network Usage and Protocol Analyzer
- npasswd: New passwd
- top: Advanced ps
- TCP Wrappers: Advanced TCP Superdaemon
- chrootuid: Advanced chroot with the setuid Feature
- rpcbind: More Secure rpcbind
- logdaemon: Secure rlogind, rshd, login, rexecd, and ftpd Replacements
- argus: Audit Record Generation and Utilization System
- tcpdump: Network Monitoring and Data Acquisition Tool
- libpcap: Portable Packet-Capture Library
- genpass: Random-Password Generator
- xinetd: Extended Internet Superdaemon
- Summary
-
Network Security
- Minimization for Network Security
- Fine-Tuning the Solaris 8 TCP/IP Stack
- Types of Firewalls
- Solaris Firewalls
- Router-Based Firewalls
- Network Intrusion Detection Systems
- Network/Port Address Translation (NAT/PAT)
- Network Troubleshooting
- Remote Vulnerability Testing: Nessus
- A Sample ndd(1M) Setup
- Summary
- IP Security Architecture (IPsec)
- Securing Network Services
- Internet Protocols
- TCP and UDP Port Numbers
- Solaris 8 Standards Conformance
- Types of Attacks and Vulnerabilities
- System and Network Security Checklist
- Security Resources
- Trusted Solaris 8
- SunScreen 3.1 Lite
- Glossary
Product information
- Title: Solaris 8 Security
- Author(s):
- Release date: October 2001
- Publisher(s): Que
- ISBN: 9781578702701
You might also like
book
Microsoft® Windows® 2000 Security Handbook
Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing …
book
SUSE™ Linux 10 Unleashed
Master the newest version of SUSE Linux with SUSE Linux 10 Unleashed. This comprehensive guide to …
book
Oracle® Solaris 11 System Administration
Oracle® Solaris 11 System Administration covers every skill required to effectively install and administer the Oracle® …
book
CompTIA® Security+ SY0-401 Cert Guide, Deluxe Edition, Third Edition
This is the eBook version of the print title. Note that the eBook does not provide …