Felitaur Site
Offerings
|
   
|
Security Section 1
[Linux System Administration Homepage]
Overview |
- Security Issues
- Social Engineering
- Types of Attacks
- Detecting Attacks (IDS)
- Server Maintenance Issues
Goals:
- Know where your major weaknesses for security exist.
- Know how to increase your security by training users
- Know the common ways systems are attacked
- Understand what IDS (intrusion detection systems) do, what
their limitations are as well.
- Configure tripwire, install/use snort, portsentry.
- Run Chkrootkit, know what it is used for as well.
Files/directories covered:
Commands:
|
Questions |
- Why would you consider the "update agent" in Redhat to be a security
program?
- What is a DOS? DDOS? Buffer overflow attack?
- What is a trojan horse?
- What is a root kit?
- What is a script kiddie? What is a hacker/cracker? What was the
original definition of hacker?
- What is social engineering? How do you prevent it?
- What servers/services are the most vulnerable?
- Why use ssh, sftp instead of ftp, telnet?
- Why is imapd and popd a possible problem?
- If you use a wireless connection, what do you have to be careful of?
|
Activites |
|
References |
This page last updated on:
|
|
|