O'Reilly logo

Information Security The Complete Reference, Second Edition by Mark Rhodes-Ousley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER
23 Securing Infrastructure Services
 
Certain core infrastructure services in the IT environment deserve special attention from the security practitioner, and that’s what this chapter is about. We already covered operating system security in Chapters 21 and 22, and network security in Chapters 13 and 14. But within the network there are certain applications that run on top of those operating systems and provide network connectivity essentials, on which the entire IT infrastructure depends. If those services go down, or if they are corrupted or abused by malicious software and attackers, security can be compromised. Thus, in this chapter we will look at specific security configurations and controls that can be applied to the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required