TAILIEUCHUNG - Open Source Security Tools : Practical Guide to Security Applications part 3

Open Source Security Tools : Practical Guide to Security Applications part 3. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page xxi Tuesday June 29 2004 3 06 PM xxi Open Source Security Tools Index Tool Name On CD Linux UNIX Windows Page Number Swatch Yes Yes No 236 Tcpdump Yes Yes No 167 Traceroute No Yes Yes 32 Tripwire Yes Yes No 226 Turtle Firewall Yes Yes No 71 Whois No Yes Yes 35 Windump Yes No Yes 181 Page xxii Wednesday June 23 2004 10 48 PM Page 1 Wednesday June 23 2004 2 58 PM Chapter 1 Information Security and Open Source Software When Tom Powers took a new job as system administrator at a mid-sized energy company he knew his computer security skills had been a critical factor for being hired. The company had been hacked several times in the last year and their home page had been replaced with obscene images. Management wanted him to make their company information more secure from digital attacks in addition to running the computer network day to day. After only his first day on the job he knew he was in for a challenge. The company lacked even the most basic security protections. Their Internet connection protected only by a simple ISP router was wide open to the world. Their public servers were ill-maintained and looked like they hadn t been touched since they were installed. And his budget for improving this situation was practically nothing. Yet within four months Tom had stabilized the network stopped any further attacks locked down the public access points and cleaned up the internal network as well as adding services that weren t there before. How could he do all this with such limited resources He knew the basic principles and concepts of information security and found the right software tools to get the job done. He developed a plan and methodically carried out the following steps using security tools to improve company security. Securing the Perimeter First Tom had to establish some basic defenses to protect his network from the outside so he could direct his time to securing the servers and the inside of the network. He

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.