Chapter 13. Computer Security Issues

In This Chapter

  • Linux security checklist

  • Using password protection

  • Protecting Linux with the iptables firewall

  • Control system access with TCP wrappers

  • Checking log files

  • Using the secure shell (SSH) package

  • Understanding attack techniques

  • Securing servers with SELinux

  • Protecting servers with encryption and certificates

  • Managing identities with FreeIPA

With the growth of the Internet, computer and network security have become more important than ever. Assaults on your Fedora system can come in many forms, such as denial-of-service (DoS) attacks, break-in attempts, or hijacking your machine as a spam relay, to name a few.

In many cases, good practices for setting and protecting passwords, monitoring log files, and creating good firewalls will keep out many would-be intruders. Keeping up with critical security software updates will help patch vulnerabilities as they become known. The addition of SELinux adds another layer of protection on your Linux system. Sometimes, more proactive approaches are needed to respond to break-ins. This chapter will familiarize you, as a Linux administrator, with the dangers that exist and the tools available to protect your system.

Linux Security Checklist

While Linux offers all the tools you need to secure your computer, if you are careless, someone can (and probably will) harm your system or try to steal your data. The following checklist covers a range of security measures to protect your Linux desktop or server.

  • Add users and ...

Get Fedora Bible 2010 Edition: Featuring Fedora Linux 12 now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.