Cover Page: i Title Page Page: i Copyright Page: ii Acknowledgments Page: iii About the Author Page: v About the Technical Editor Page: v Introduction Page: xiii What Does This Book Cover? Page: xiii Interactive Online Learning Environment and Test Bank Page: xiv Chapter 1 Using Digital Resources Responsibly Page: 1 Protecting Personal Rights Page: 2 Protecting Digital Privacy Page: 3 Establishing Authenticity Page: 7 Summary Page: 9 Back to the Basics Page: 9 Review Questions Page: 10 Chapter 2 What Are Vulnerabilities and Threats? Page: 15 The Basics: What Are We Trying to Accomplish Here? Page: 16 Common Vulnerabilities Page: 19 Digital Espionage Page: 21 Stolen Credentials Page: 23 Malware Page: 24 Network-Based Attacks Page: 25 Summary Page: 26 Back to the Basics Page: 27 Review Questions Page: 27 Chapter 3 Controlling Access to Your Assets Page: 33 Controlling Physical Access Page: 34 Controlling Network Access Page: 44 Controlling Software Sources Page: 50 Summary Page: 51 Back to the Basics Page: 52 Review Questions Page: 53 Chapter 4 Controlling Network Connections Page: 59 Understanding Network Architecture Page: 60 Auditing Networks Page: 65 Securing Networks Page: 71 Summary Page: 74 Back to the Basics Page: 75 Review Questions Page: 75 Chapter 5 Encrypting Your Data at Rest Page: 81 What Is Encryption? Page: 82 Encryption Usage Patterns Page: 85 Encryption Technologies Page: 87 Summary Page: 88 Back to the Basics Page: 89 Review Questions Page: 89 Chapter 6 Encrypting Your Moving Data Page: 93 Website Encryption Page: 94 Email Encryption Page: 99 Working with VPN Connections and Software Repositories Page: 100 Summary Page: 104 Back to the Basics Page: 105 Review Questions Page: 105 Chapter 7 Risk Assessment Page: 109 Conducting Open Source Intelligence Gathering Page: 110 Accessing Public Vulnerability Databases Page: 112 Conducting Vulnerability Scans Page: 115 Conducting Penetration Tests Page: 117 Summary Page: 119 Back to the Basics Page: 119 Review Questions Page: 120 Chapter 8 Configuring System Backups and Monitoring Page: 125 Why You Need to Get Backups Right the First Time Page: 126 Backup Types Page: 131 Multitier Backups Page: 133 Configuring Monitoring and Alerts Page: 135 Summary Page: 137 Back to the Basics Page: 138 Review Questions Page: 138 Chapter 9 Resource Isolation Design Patterns Page: 143 Configuring Network Firewalling Page: 144 Working with Sandbox Environments Page: 147 Controlling Local System Access Page: 150 Summary Page: 151 Back to the Basics Page: 152 Review Questions Page: 152 Appendix Answers to Review Questions Page: 155 Chapter 1: Using Digital Resources Responsibly Page: 155 Chapter 2: What are Vulnerabilities and Threats? Page: 156 Chapter 3: Controlling Access to Your Assets Page: 158 Chapter 4: Controlling Network Connections Page: 160 Chapter 5: Encrypting Your Data at Rest Page: 161 Chapter 6: Encrypting Your Moving Data Page: 162 Chapter 7: Risk Assessment Page: 163 Chapter 8: Configuring System Backups and Monitoring Page: 164 Chapter 9: Resource Isolation Design Patterns Page: 166 Index Page: 167 End User License Agreement Page: 177
Description:Includes one year of FREE access after activation to the online test bank and study tools:
The Sybex™ method for teaching Linux® security concepts
Understanding Linux Security is essential for administration professionals. Linux Security Fundamentals covers all the IT security basics to help active and aspiring admins respond successfully to the modern threat landscape. You'll improve your ability to combat major security threats against computer systems, networks, and services. You'll discover how to prevent and mitigate attacks against personal devices and how to encrypt secure data transfers through networks, storage devices, or the cloud. Linux Security Fundamentals teaches:
Interactive learning environment
Take your skills to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access to: