Reasonably Secure Installs
Background: Security
Background: Security (cont.)
Security Myths
Security Myths (cont.)
Risks Posed by Crackers
Risks Posed by Crackers (cont.)
Views on Security
Views on Security
Views on Security
Views on Security
Views on Security
Personal Awareness
Intrusion Detection
Perimeter Defenses
Internal Security
What are you security needs?
What are you security needs?
Who are you defending against?
Who are you defending against?
Who are you defending against?
Who are you defending against?
What are you protecting?
Basic Security
Security Planning
Security Planning
Security Planning
Security Planning
Security Planning
Hardware Planning
Hardware Planning
Hardware Planning
Filesystem planning
Filesystem Planning (cont.)
Filesystem Planning (cont.)
Installation
Installation (cont.)
Patching the system
Patching the system (cont.)
Patching the System (cont.)
Patching the System (cont.)
Armoring the System
Application Links
Application Links (cont.)
Application Links (cont.)
Application Links (cont.)
Application Links (cont.)
Application Links (cont.)
Application Links (cont.)
Application Links (cont.)
Application Links (cont.)
Application Links (cont.)
Application Links (cont.)
Final Testing
Final Testing (cont.)
Conclusion
Links