Reasonably Secure Installs

Background: Security

Background: Security (cont.)

Security Myths

Security Myths (cont.)

Risks Posed by Crackers

Risks Posed by Crackers (cont.)

Views on Security

Views on Security

Views on Security

Views on Security

Views on Security

Personal Awareness

Intrusion Detection

Perimeter Defenses

Internal Security

What are you security needs?

What are you security needs?

Who are you defending against?

Who are you defending against?

Who are you defending against?

Who are you defending against?

What are you protecting?

Basic Security

Security Planning

Security Planning

Security Planning

Security Planning

Security Planning

Hardware Planning

Hardware Planning

Hardware Planning

Filesystem planning

Filesystem Planning (cont.)

Filesystem Planning (cont.)

Installation

Installation (cont.)

Patching the system

Patching the system (cont.)

Patching the System (cont.)

Patching the System (cont.)

Armoring the System

Application Links

Application Links (cont.)

Application Links (cont.)

Application Links (cont.)

Application Links (cont.)

Application Links (cont.)

Application Links (cont.)

Application Links (cont.)

Application Links (cont.)

Application Links (cont.)

Application Links (cont.)

Final Testing

Final Testing (cont.)

Conclusion

Links