Red Hat Linux Fedora For Dummies [Electronic resources]

Jon Hall

نسخه متنی -صفحه : 194/ 124
نمايش فراداده

Chapter 21: Ten Security Vulnerabilities

Overview

In This Chapter

Simplifying your system

Encrypting your communications

Using firewalls

Updating your software

Backing up your data

Introducing buffer overflows

Getting social

Using good passwords

Scanning the horizon

Keeping track of your logs

They’re here! The monster is under the bed. That big wooden horse is full of Greeks. Here’s Johnny! Come into the light. And so on, and so on. However you say it, one thing’s for sure: The bad guys are out to get you.

Do you want the good news or the bad news first? The good news is, the Internet has changed the world for the better and continues to do so in more and unforeseen ways. And the speed of change will only accelerate. The bad news is, because the Internet is constantly changing, the number of ways that someone can use the Internet to hurt you is always growing. This chapter outlines some of the more dangerous spooks that lurk out on that poorly lit electronic street.

Our purpose in this chapter is to point you in the right direction so that you can gain a general awareness of computer security. Computer security is, unfortunately, a complex subject. Because of the complexity of the topic of security, we cannot hope to do any more here than touch on some important aspects. We just try to give you the most bang for your buck by adding a few simple but effective security measures to your new Red Hat Linux computer.

This chapter introduces ten important security topics. You can use them as a starting point to increase your computer security.