Chapter 2

Securing Linux

IN THIS CHAPTER

Bullet Securing passwords on Linux systems

Bullet Protecting the system’s files and directories

Bullet Using GnuPG to encrypt and sign files

Bullet Monitoring the security of your system

Bullet Hardening Internet services

Bullet Using Secure Shell for secure remote logins

Bullet Setting up simple firewalls and enabling packet filtering

To secure your Linux system, you have to pay attention to both host security and network security. The distinction between the two types of security is somewhat arbitrary, because securing the network involves securing the applications on the host that relate to which Internet services your system offers.

This chapter first examines host security and then explains how you can secure network services (mostly by not offering unnecessary services), how you can ...

Get Linux All-In-One For Dummies, 7th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.