Table of Contents for
Practical UNIX and Internet Security, 3rd Edition
Close
Version ebook
/
Retour
Practical UNIX and Internet Security, 3rd Edition
by Alan Schwartz
Published by O'Reilly Media, Inc., 2003
Cover
Practical Unix & Internet Security, 3rd Edition
A Note Regarding Supplemental Files
Preface
Unix “Security”?
Scope of This Book
Which Unix System?
Conventions Used in This Book
Comments and Questions
Acknowledgments
A Note to Would-Be Attackers
I. Computer Security Basics
1. Introduction: Some Fundamental Questions
What Is Computer Security?
What Is an Operating System?
What Is a Deployment Environment?
Summary
2. Unix History and Lineage
History of Unix
Security and Unix
Role of This Book
Summary
3. Policies and Guidelines
Planning Your Security Needs
Risk Assessment
Cost-Benefit Analysis and Best Practices
Policy
Compliance Audits
Outsourcing Options
The Problem with Security Through Obscurity
Summary
II. Security Building Blocks
4. Users, Passwords, and Authentication
Logging in with Usernames and Passwords
The Care and Feeding of Passwords
How Unix Implements Passwords
Network Account and Authorization Systems
Pluggable Authentication Modules (PAM)
Summary
5. Users, Groups, and the Superuser
Users and Groups
The Superuser (root)
The su Command: Changing Who You Claim to Be
Restrictions on the Superuser
Summary
6. Filesystems and Security
Understanding Filesystems
File Attributes and Permissions
chmod: Changing a File’s Permissions
The umask
SUID and SGID
Device Files
Changing a File’s Owner or Group
Summary
7. Cryptography Basics
Understanding Cryptography
Symmetric Key Algorithms
Public Key Algorithms
Message Digest Functions
Summary
8. Physical Security for Servers
Planning for the Forgotten Threats
Protecting Computer Hardware
Preventing Theft
Protecting Your Data
Story: A Failed Site Inspection
Summary
9. Personnel Security
Background Checks
On the Job
Departure
Other People
Summary
III. Network and Internet Security
10. Modems and Dialup Security
Modems: Theory of Operation
Modems and Security
Modems and Unix
Additional Security for Modems
Summary
11. TCP/IP Networks
Networking
IP: The Internet Protocol
IP Security
Summary
12. Securing TCP and UDP Services
Understanding Unix Internet Servers and Services
Controlling Access to Servers
Primary Unix Network Services
Managing Services Securely
Putting It All Together: An Example
Summary
13. Sun RPC
Remote Procedure Call (RPC)
Secure RPC (AUTH_DES)
Summary
14. Network-Based Authentication Systems
Sun’s Network Information Service (NIS)
Sun’s NIS+
Kerberos
LDAP
Other Network Authentication Systems
Summary
15. Network Filesystems
Understanding NFS
Server-Side NFS Security
Client-Side NFS Security
Improving NFS Security
Some Last Comments on NFS
Understanding SMB
Summary
16. Secure Programming Techniques
One Bug Can Ruin Your Whole Day . . .
Tips on Avoiding Security-Related Bugs
Tips on Writing Network Programs
Tips on Writing SUID/SGID Programs
Using chroot( )
Tips on Using Passwords
Tips on Generating Random Numbers
Summary
IV. Secure Operations
17. Keeping Up to Date
Software Management Systems
Updating System Software
Summary
18. Backups
Why Make Backups?
Backing Up System Files
Software for Backups
Summary
19. Defending Accounts
Dangerous Accounts
Monitoring File Format
Restricting Logins
Managing Dormant Accounts
Protecting the root Account
One-Time Passwords
Administrative Techniques for Conventional Passwords
Intrusion Detection Systems
Summary
20. Integrity Management
The Need for Integrity
Protecting Integrity
Detecting Changes After the Fact
Integrity-Checking Tools
Summary
21. Auditing, Logging, and Forensics
Unix Log File Utilities
Process Accounting: The acct/pacct File
Program-Specific Log Files
Designing a Site-Wide Log Policy
Handwritten Logs
Managing Log Files
Unix Forensics
Summary
V. Handling Security Incidents
22. Discovering a Break-in
Prelude
Discovering an Intruder
Cleaning Up After the Intruder
Case Studies
Summary
23. Protecting Against Programmed Threats
Programmed Threats: Definitions
Damage
Authors
Entry
Protecting Yourself
Preventing Attacks
Summary
24. Denial of Service Attacks and Solutions
Types of Attacks
Destructive Attacks
Overload Attacks
Network Denial of Service Attacks
Summary
25. Computer Crime
Your Legal Options After a Break-in
Criminal Hazards
Criminal Subject Matter
Summary
26. Who Do You Trust?
Can You Trust Your Computer?
Can You Trust Your Suppliers?
Can You Trust People?
Summary
VI. Appendixes
A. Unix Security Checklist
Preface
Chapter 1: Introduction: Some Fundamental Questions
Chapter 2: Unix History and Lineage
Chapter 3: Policies and Guidelines
Chapter 4: Users, Passwords, and Authentication
Chapter 5: Users, Groups, and the Superuser
Chapter 6: Filesystems and Security
Chapter 7: Cryptography Basics
Chapter 8: Physical Security for Servers
Chapter 9: Personnel Security
Chapter 10: Modems and Dialup Security
Chapter 11: TCP/IP Networks
Chapter 12: Securing TCP and UDP Services
Chapter 13: Sun RPC
Chapter 14: Network-Based Authentication Systems
Chapter 15: Network Filesystems
Chapter 16: Secure Programming Techniques
Chapter 17: Keeping Up to Date
Chapter 18: Backups
Chapter 19: Defending Accounts
Chapter 20: Integrity Management
Chapter 21: Auditing, Logging, and Forensics
Chapter 22: Discovering a Break-In
Chapter 23: Protecting Against Programmed Threats
Chapter 24: Denial of Service Attacks and Solutions
Chapter 25: Computer Crime
Chapter 26: Who Do You Trust?
Appendix A: Unix Security Checklist
Appendix B: Unix Processes
Appendixes C, D, and E: Paper Sources, Electronic Sources, and Organizations
B. Unix Processes
About Processes
Signals
Controlling and Examining Processes
Starting Up Unix and Logging In
C. Paper Sources
Unix Security References
Other Computer References
D. Electronic Resources
Mailing Lists
Web Sites
Usenet Groups
Software Resources
E. Organizations
Professional Organizations
U.S. Government Organizations
Emergency Response Organizations
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
About the Authors
Colophon
Copyright
Next
Next Chapter
Practical Unix & Internet Security, 3rd Edition
Next
Next Chapter
Practical Unix & Internet Security, 3rd Edition