Introduction to Redhat Linux Host Security
Intruders are constantly trying to break into systems, snoop around, steal software, and corrupt programs. Intruders are not particular about their targets. Small systems are just as vulnerable as large ones.
Once your system has been compromised, it can no longer be trusted, so you can save yourself time and money by being prepared.
This module discusses techniques to protect your system from unwanted intruders.
By learning what intruders do when they break into your system, you will be able to better defend yourself against a break-in.
You will also learn about known security problems and how to correct them. The techniques to determine whether or not your system has been compromised will also be discussed.
After completing this module, you should be able to:
- Explain why it's important to protect your console
- Describe security concerns related to network access
- Explain how crackers get into a system
- Describe what crackers do
- List ways to detect attacks
- Describe insecure remote login services
- Describe secure remote login services
- Control the root login process
- Explain the use of the
- Find modified and sticky files
- Describe the
- Describe RPM verification
In the next lesson, protecting your console access will be discussed..