Linux Security Fundamentals

個数:
  • ポイントキャンペーン

Linux Security Fundamentals

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 192 p.
  • 言語 ENG
  • 商品コード 9781119781462
  • DDC分類 004

Full Description

Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.

This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include:

 •     Security Concepts

•      Encryption

•      Node, Device and Storage Security

•      Network and Service Security

•      Identity and Privacy 

Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.

Contents

Introduction xiii

Chapter 1 Using Digital Resources Responsibly 1

Protecting Personal Rights 2

Protecting Digital Privacy 4

What is Personal Data? 4

Where Might My Personal Data Be Hanging Out? 4

What Are My Responsibilities as a Site Administrator? 6

Can Escaped Genies Be Forced Back into Their Bottles? 6

What Can I Do as a User? 7

Establishing Authenticity 7

Think About the Source 8

Be Aware of Common Threat Categories 8

Summary 9

Back to the Basics 10

Review Questions 11

Chapter 2 What Are Vulnerabilities and Threats? 15

The Basics: What Are We Trying to Accomplish Here? 16

What Are Vulnerabilities and Threats? 17

What Can Be Exploited? 17

Who's Doing the Exploiting? 18

Why Do They Attack? 19

Common Vulnerabilities 20

Software Vulnerabilities 20

Hardware Vulnerabilities 21

Bioware Vulnerabilities 21

Digital Espionage 21

USB Devices 21

Backdoors 22

Wireless Entry Points 22

Stolen Credentials 23

Data Breaches 23

Identity Theft (Besides Breaches) 24

Malware 24

Network-Based Attacks 25

Man-in-the-Middle Attacks 25

Denial-of-Service and Distributed Denial-of-Service Attacks 26

Network Routing Attacks 26

Summary 26

Back to the Basics 27

Review Questions 28

Chapter 3 Controlling Access to Your Assets 33

Controlling Physical Access 34

Understanding Your Devices 34

Protecting Your Devices 36

Managing Authentication Through Effective Password Use 38

Managing Authorization Through Permissions 44

Controlling Network Access 45

Firewalls 45

Virus and Malware Protection 48

Educating Your Users 49

Controlling Software Sources 50

PC Software Repositories 51

Mobile Package Management 51

Summary 52

Back to the Basics 52

Review Questions 54

Chapter 4 Controlling Network Connections 59

Understanding Network Architecture 60

The Transmission Control Protocol 60

The Internet Protocol 61

Understanding the Domain Name System 64

Auditing Networks 65

Network Auditing Tools 66

Automating Audits 70

Securing Networks 71

Patch Your Software 71

Physically Secure Your Infrastructure 73

Secure Your Network Behavior 73

Other Stuff 74

Summary 74

Back to the Basics 75

Review Questions 76

Chapter 5 Encrypting Your Data at Rest 81

What is Encryption? 82

Encryption Usage Patterns 85

What Should You Encrypt? 85

Understanding Hashing vs. Encryption 86

What Are Blockchains? 86

Encryption Technologies 87

Summary 89

Back to the Basics 89

Review Questions 90

Chapter 6 Encrypting Your Moving Data 93

Website Encryption 94

Why You Should Use Encryption 95

How Website Encryption Works 96

Generating Certificates 98

Email Encryption 99

GNU Privacy Guard 100

Does Gmail Encrypt Your Emails? 100

Working with VPN Connections and Software Repositories 100

Securing Your Actions Using VPNs 101

Securing Transfers from Software Repositories 104

Summary 105

Back to the Basics 105

Review Questions 106

Chapter 7 Risk Assessment 109

Conducting Open Source Intelligence Gathering 111

Accessing Public Vulnerability Databases 112

Vulnerability Data Frameworks 112

Vulnerability Data Formats 113

Vulnerability Data Metrics 114

Vulnerability Data Management Tools 114

Conducting Vulnerability Scans 115

Conducting Penetration Tests 117

Attack Vectors 118

Tooling Frameworks 118

Follow-Up 119

Summary 119

Back to the Basics 120

Review Questions 121

Chapter 8 Configuring System Backups and Monitoring 125

Why You Need to Get Backups Right the First Time 127

Appreciating the Risks 128

Spreading Your Backups Across Multiple Sites 129

Testing Your Backups 130

Meeting Regulatory Compliance 131

Backup Types 132

Incremental Backups 132

Differential Backups 133

Backup Life Cycles 133

Multitier Backups 133

Multisite Storage Solutions 134

Disaster Recovery Planning 134

Configuring Monitoring and Alerts 135

Working with System Logs 135

Intrusion Detection 136

Summary 137

Back to the Basics 138

Review Questions 139

Chapter 9 Resource Isolation Design Patterns 143

Configuring Network Firewalling 145

Balancing Public and Private Networks 145

Building Isolated Development Environments 147

Working with Sandbox Environments 148

Use Cases for Sandboxes 148

Sandbox Designs 149

Controlling Local System Access 150

Configuring Mandatory Access Controls 150

Setting Usage Quotas 151

Summary 152

Back to the Basics 152

Review Questions 153

Appendix Answers to Review Questions 155

Chapter 1: Using Digital Resources Responsibly 156

Chapter 2: What are Vulnerabilities and Threats? 157

Chapter 3: Controlling Access to Your Assets 158

Chapter 4: Controlling Network Connections 160

Chapter 5: Encrypting Your Data at Rest 161

Chapter 6: Encrypting Your Moving Data 162

Chapter 7: Risk Assessment 163

Chapter 8: Configuring System Backups and Monitoring 165

Chapter 9: Resource Isolation Design Patterns 166

Index 167

最近チェックした商品