Chapter 12: Eliminating the Security Weakness of Linux and UNIX Operating Systems
Abstract
This chapter provides a comprehensive guide to securing Linux and UNIX operating systems and infrastructure against modern cybersecurity threats. It examines the most common vulnerabilities and attack vectors targeting Linux/UNIX platforms in order to equip administrators and security teams with in-depth defensive techniques and best practices. Topics covered include establishing secure system configurations, managing system updates, hardening access controls, implementing firewalls and intrusion systems, malware prevention, and instilling organizational vigilance. Concrete examples and practical ...
Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.