Chapter 21: Ten Security Vulnerabilities
Overview
In This Chapter
Simplifying your system
Encrypting your communications
Using firewalls
Updating your software
Backing up your data
Introducing buffer overflows
Getting social
Using good passwords
Scanning the horizon
Keeping track of your logs
They’re here! The monster is under the bed. That big wooden horse is full of Greeks. Here’s Johnny! Come into the light. And so on, and so on. However you say it, one thing’s for sure: The bad guys are out to get you.Do you want the good news or the bad news first? The good news is, the Internet has changed the world for the better and continues to do so in more and unforeseen ways. And the speed of change will only accelerate. The bad news is, because the Internet is constantly changing, the number of ways that someone can use the Internet to hurt you is always growing. This chapter outlines some of the more dangerous spooks that lurk out on that poorly lit electronic street.Our purpose in this chapter is to point you in the right direction so that you can gain a general awareness of computer security. Computer security is, unfortunately, a complex subject. Because of the complexity of the topic of security, we cannot hope to do any more here than touch on some important aspects. We just try to give you the most bang for your buck by adding a few simple but effective security measures to your new Red Hat Linux computer.This chapter introduces ten important security topics. You can use them as a starting point to increase your computer security.