Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Ensure that systems are kept up-to-date with patches. As a result of security testing, it may become necessary to patch many systems. Applying patches in a timely manner can sharply reduce the vulnerability exposure of an organization. Organizations should centralize their patching efforts so as to ensure that more systems are patched as quickly as possible and immediately tested. Look at the big picture. The results of routine testing may indicate that an organization should readdress its systems security architecture. Some organizations may need to step back and undergo a formal process of identifying. | RH253 - Red Hat Enterprise Linux Network Services and Security Administration RH253 - Red Hat Enterprise Linux Network Services and Security Administration Introduction - RH253 Network Services and Security Administration Copyright Welcome Participant Introductions Red Hat Enterprise Linux Red Hat Enterprise Linux Variants Red Hat Network Other Red Hat Supported Software The Fedora Project Classroom Network Objectives of RH253 Audience and Prerequisites Unit 1 - System Performance and Security Objectives System Resources as Services Security in Principle Security in Practice Security Policy the People Security Policy the System Response Strategies System Faults and Breaches Method of Fault Analysis Fault Analysis Hypothesis Method of Fault Analysis continued http www.way2download.com linux RH253 1 of 10 2008 02 06 08 25 50 PM RH253 - Red Hat Enterprise Linux Network Services and Security Administration Fault Analysis Gathering Data Benefits of System Monitoring Network Monitoring Utilities Networking a Local view Networking a Remote view File System Analysis Typical Problematic Permissions Monitoring Processes Process Monitoring Utilities System Activity Reporting Managing Processes by Account System Log Files syslogd and klogd Configuration Log File Analysis End of Unit 1 Unit 2 - System Service Access Controls Objectives System Resources Managed by init System Initialization and Service Management chkconfig Initialization Script Management xinetd Managed Services xinetd Default Controls xinetd Service Configuration xinetd Access Controls Host Pattern Access Controls The etc sysconfig files Service and Application Access Controls tcp wrappers Configuration http www.way2download.com linux RH253 2 of 10 2008 02 06 08 25 50 PM RH253 - Red Hat Enterprise Linux Network Services and Security Administration Daemon Specification Client Specification Macro Definitions Extended Options A tcp wrappers Example xinetd and tcp wrappers SELinux SELinux continued SELinux Targeted