The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Contents
  5. Dedication Page
  6. Purpose of This Book
  7. Acknowledgments
  8. About the Authors
  9. CHAPTER 1 Security Threats to Linux
  10. CHAPTER 2 Basic Components of Linux Security
  11. CHAPTER 3 Starting Off: Getting Up and Running
  12. CHAPTER 4 User Privileges and Permissions
  13. CHAPTER 5 Filesystems, Volumes, and Encryption
  14. CHAPTER 6 Securing Services
  15. CHAPTER 7 Networks, Firewalls, and More
  16. CHAPTER 8 Networked Filesystems and Remote Access
  17. CHAPTER 9 Networked Application Security
  18. CHAPTER 10 Kernel Security Risk Mitigation
  19. CHAPTER 11 Managing Security Alerts and Updates
  20. CHAPTER 12 Building and Maintaining a Security Baseline
  21. CHAPTER 13 Testing and Reporting
  22. CHAPTER 14 Detecting and Responding to Security Breaches
  23. CHAPTER 15 Best Practices and Emerging Technologies
  24. APPENDIX A Answer Key
  25. APPENDIX B Standard Acronyms
  26. Glossary of Key Terms
  27. References
  28. Index