logo © 1996 Phil Waclawski
Felitaur Site
Offerings
About Me
Crafts
Services
ftp files
Help Files
What's New?
Home Page
Other Links
Anatomy &
Physiology
Arthropods
Biology
Computers
Ferrets
Fun Links
Internet
Linux
S.C.A.
Win 95/NT
Comments or
Suggestions
webmaster@ felitaur.com
   
Security Section 1
[Linux System Administration Homepage]
Overview
  • Security Issues
  • Social Engineering
  • Types of Attacks
  • Detecting Attacks (IDS)
  • Server Maintenance Issues
Goals:
  • Know where your major weaknesses for security exist.
  • Know how to increase your security by training users
  • Know the common ways systems are attacked
  • Understand what IDS (intrusion detection systems) do, what their limitations are as well.
  • Configure tripwire, install/use snort, portsentry.
  • Run Chkrootkit, know what it is used for as well.
Files/directories covered:

Commands:

Questions
  • Why would you consider the "update agent" in Redhat to be a security program?
  • What is a DOS? DDOS? Buffer overflow attack?
  • What is a trojan horse?
  • What is a root kit?
  • What is a script kiddie? What is a hacker/cracker? What was the original definition of hacker?
  • What is social engineering? How do you prevent it?
  • What servers/services are the most vulnerable?
  • Why use ssh, sftp instead of ftp, telnet?
  • Why is imapd and popd a possible problem?
  • If you use a wireless connection, what do you have to be careful of?
Activites
References
This page last updated on: