Table of contentsReasonably Secure Installs Background: Security Background: Security (cont.) Security Myths Security Myths (cont.) Risks Posed by Crackers Risks Posed by Crackers (cont.) Views on Security Views on Security Views on Security Views on Security Views on Security Personal Awareness Intrusion Detection Perimeter Defenses Internal Security What are you security needs? What are you security needs? Who are you defending against? Who are you defending against? Who are you defending against? Who are you defending against? What are you protecting? Basic Security Security Planning Security Planning Security Planning Security Planning Security Planning Hardware Planning Hardware Planning Hardware Planning Filesystem planning Filesystem Planning (cont.) Filesystem Planning (cont.) Installation Installation (cont.) Patching the system Patching the system (cont.) Patching the System (cont.) Patching the System (cont.) Armoring the System Application Links Application Links (cont.) Application Links (cont.) Application Links (cont.) Application Links (cont.) Application Links (cont.) Application Links (cont.) Application Links (cont.) Application Links (cont.) Application Links (cont.) Application Links (cont.) Final Testing Final Testing (cont.) Conclusion Links |
Author: bradley alexander E-mail: storm@tux.org |