tailieunhanh - Open Source Security Tools : Practical Guide to Security Applications part 3

Open Source Security Tools : Practical Guide to Security Applications part 3. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page xxi Tuesday June 29 2004 3 06 PM xxi Open Source Security Tools Index Tool Name On CD Linux UNIX Windows Page Number Swatch Yes Yes No 236 Tcpdump Yes Yes No 167 Traceroute No Yes Yes 32 Tripwire Yes Yes No 226 Turtle Firewall Yes Yes No 71 Whois No Yes Yes 35 Windump Yes No Yes 181 Page xxii Wednesday June 23 2004 10 48 PM Page 1 Wednesday June 23 2004 2 58 PM Chapter 1 Information Security and Open Source Software When Tom Powers took a new job as system administrator at a mid-sized energy company he knew his computer security skills had been a critical factor for being hired. The company had been hacked several times in the last year and their home page had been replaced with obscene images. Management wanted him to make their company information more secure from digital attacks in addition to running the computer network day to day. After only his first day on the job he knew he was in for a challenge. The company lacked even the most basic security protections. Their Internet connection protected only by a simple ISP router was wide open to the world. Their public servers were ill-maintained and looked like they hadn t been touched since they were installed. And his budget for improving this situation was practically nothing. Yet within four months Tom had stabilized the network stopped any further attacks locked down the public access points and cleaned up the internal network as well as adding services that weren t there before. How could he do all this with such limited resources He knew the basic principles and concepts of information security and found the right software tools to get the job done. He developed a plan and methodically carried out the following steps using security tools to improve company security. Securing the Perimeter First Tom had to establish some basic defenses to protect his network from the outside so he could direct his time to securing the servers and the inside of the network. He

TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
31    253    0    29-04-2024
46    187    0    29-04-2024
33    125    0    29-04-2024
6    93    0    29-04-2024
165    86    0    29-04-2024
380    93    0    29-04-2024
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.