Organization of This BookThis book provides a comprehensive approach to security by giving you guidelines for securing a system along with configuration details for particular services. Chapter 1, Threat Modeling and Risk Management, introduces the proper attitude and mental habits for thinking securely, including two systematic ways to assess risk: Annualized Loss Expectancies and Attack Trees. Chapter 2, Designing Perimeter Networks, describes where in your network topology to place firewalls and bastion hosts.Chapter 3, Hardening Linux and Using iptables, is a major chapter that shows you how to close up security holes on the operating system level, check your work with nmap and Nessus port scans, create firewalls for servers, and run Bastille.Chapter 4, Secure Remote Administration, covers secure logins, including ssh and an introduction to encryption.Chapter 5, OpenSSL and Stunnel, is an in-depth discussion of setting up a certificate authority and creating virtual private network connections.Chapter 6, Securing Domain Name Services (DNS), gives comprehensive guidelines for securing both BIND and the most popular alternative, djbdns.Chapter 7, Using LDAP For Authentication, introduced OpenLDAP and explains its place in user authentication.Chapter 8, Database Security, covers general considerations for running a database securely, along with details on the MySQL database.Chapter 9, Securing Internet Email, covers the extensive security-related options in Sendmail, Postfix, and Cyrus IMAP. SASL, SMTP AUTH, and email encryption are covered.Chapter 10, Securing Web Servers, is an in-depth approach to the many risks and solutions involved in running Apache, Perl and PHP CGI scripts, and other dynamic features of web sites.Chapter 11, Securing File Services, explains how to configure the ProFTPD and vsftpd FTP servers and how to use rsync.Chapter 12, System Log Management and Monitoring, covers the use of syslog and Syslog-ng for logging and Swatch for automated logfile monitoring.Chapter 13, Simple Intrusion Detection Techniques, introduces the complex field of intrusion detection and offers in-depth coverage of Tripwire and Snort.The Appendix, Two Complete iptables Startup Scripts, provides models for creating firewalls. |