Red Hat ENTERPRISE LINUX 3 - SECURITY GUIDE Manual page 131

Hide thumbs Also See for ENTERPRISE LINUX 3 - SECURITY GUIDE:
Table of Contents

Advertisement

N
Nessus, 78
Netfilter, 66
additional resources, 71
Netfilter 6, 70
netstat, 48
network services, 33
identifying and configuring, 33
risks, 33
buffer overflow, 33
denial-of-service, 33
script vulnerability, 33
network topologies, 97
linear bus, 97
ring, 97
star, 97
networks, 97
and security, 97
de-militarized zones (DMZs), 99
hubs, 98
segmentation, 99
switches, 98
wireless, 98
NFS, 43
and Sendmail, 47
network design, 43
syntax errors, 43
Nikto, 78
NIS
introducing, 40
IPTables, 42
Kerberos, 42
NIS domain name, 41
planning network, 41
securenets, 41
static ports, 42
nmap, 48, 77
command line version, 77
O
OpenSSH, 36
scp, 36
sftp, 36
ssh, 36
overview, 1
P
password aging, 26
password security, 22
aging, 26
and PAM, 25
auditing tools, 26
Crack, 26
John the Ripper, 26
Slurpie, 26
enforcement, 25
in an organization, 25
methodology, 25
strong passwords, 23
passwords
within an organization, 25
pluggable authentication modules (PAM)
strong password enforcement, 25
portmap, 33
and IPTables, 40
and TCP wrappers, 40
ports
common, 105
monitoring, 48
post-mortem, 91
R
reporting the incident, 94
restoring and recovering resources, 93
patching the system, 94
reinstalling the system, 94
risks
insecure services, 9
networks, 8
architectures, 8
open ports, 8
patches and errata, 9
servers, 8
inattentive administration, 9
workstations and PCs, 10, 10
applications, 10
root, 28
allowing access, 28
disallowing access, 28
limiting access, 31
and su, 31
and sudo, 32
with User Manager, 31
methods of disabling, 28
changing the root shell, 30
disabling SSH logins, 30
with PAM, 30
root user
(See root)
RPM
119

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ENTERPRISE LINUX 3 - SECURITY GUIDE and is the answer not in the manual?

Questions and answers

Table of Contents