O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mac® Security Bible

Book Description

Your essential, no-holds-barred guide to Mac security threats and solutions

Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.

  • Explains the security threats to Macs, including data in transit from your e-mail or network, and malware such as viruses, worms, and Trojan horses; these threats, formerly the exclusive worry of PC users, now increasingly threaten Macs

  • Explores physical security and hardware barriers, software settings, third-party solutions, and more

  • Shows Mac OS X users how to develop and enforce security policies

  • Covers security for Windows running on a Mac with Boot Camp, virtualization software such as Parallels Desktop or VMware Fusion, and more

  • Learn the full range of options you need to consider to make your Mac safe.

    Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

    Table of Contents

    1. Copyright
    2. About the Author
    3. Credits
    4. Acknowledgments
    5. Introduction
    6. Mac Security Basics
      1. Mac Security Overview
        1. Mac Security: Myth versus Fact
        2. Major Mac OS X Security Features
        3. Privacy versus Security
        4. Weighing Convenience against Security
        5. Understanding Your Risks
        6. The Theory and Practice of Best Practices
        7. Seven Things You Should Do Right Now
        8. Summary
      2. Securing Your Mac against Theft
        1. Security Cables and Locks
        2. Laptop Lockers
        3. Other Theft Deterrents
        4. Marking a Mac for Recovery
        5. Tracking and Recovering Stolen Macs
        6. Summary
      3. Working with User Accounts
        1. How Accounts Affect Security
        2. Understanding POSIX Permissions
        3. Types of Accounts
        4. Configuring an Account
        5. Adjusting Login Options
        6. Using Parental Controls
        7. Using the Sudo Command
        8. Using Access Control Lists
        9. Summary
      4. Configuring Basic Security Settings
        1. General Settings
        2. FileVault
        3. Firewall
        4. MobileMe Settings
        5. Energy Saver Settings
        6. Spotlight Settings
        7. AirPort Preferences
        8. Assistive Device Access
        9. Software Update
        10. Terminal
        11. Summary
      5. The Mac OS X Keychain
        1. How Keychains Work
        2. What Keychains Can Store
        3. Understanding Keychain Alerts
        4. Safari and the Keychain
        5. Using Keychain Access
        6. Summary
      6. Working with Passwords
        1. Understanding Passwords
        2. The Varieties of Mac OS X Passwords
        3. Creating Good Passwords
        4. Using Password Assistant
        5. Using Third-Party Password Utilities
        6. Resetting an Administrator's Password
        7. Using a Firmware Password
        8. Using Smart Cards, Tokens, and Biometric Authentication Devices
        9. Summary
      7. Securely Sharing System Resources
        1. Using Shared System Resources Wisely
        2. DVD or CD Sharing
        3. Screen Sharing
        4. File Sharing
        5. Printer Sharing
        6. Scanner Sharing
        7. Web Sharing
        8. Remote Login
        9. Remote Management
        10. Remote Apple Events
        11. Xgrid Sharing
        12. Internet Sharing
        13. Bluetooth Sharing
        14. Summary
      8. Backing Up Your Mac
        1. Backup Basics
        2. Choosing Backup Software
        3. Using Time Machine
        4. Creating Bootable Duplicates
        5. Using Internet Backup Services
        6. Managing Backup Media
        7. RAID and Data Redundancy
        8. Summary
    7. Protecting Your Privacy
      1. Securing Email, Chat, and Voice over IP
        1. Understanding Email Security
        2. Logging In Securely
        3. Using SSL for Incoming and Outgoing Mail
        4. Using SSL for webmail
        5. Digitally Signing and Encrypting Email
        6. Stopping Spam
        7. Examining Message Headers and Source
        8. iChat Security
        9. Securing Instant Messaging and Voice over IP with Third-Party Software
        10. Summary
      2. Browsing the Web Securely
        1. The Challenges of Secure Browsing
        2. Using SSL Encryption
        3. Keeping Form Information Safe
        4. Protecting Yourself from Harmful Downloads
        5. Protecting Yourself from Phishing Schemes
        6. Covering Your Browsing Tracks
        7. Browsing Anonymously
        8. Blocking Ads, Pop-up Windows, and Flash
        9. Blocking Other Undesirable Content
        10. Summary
      3. Securely Accessing Other Computers
        1. Transferring Files
        2. Controlling Another Computer Remotely
        3. Using SSH for Remote Login
        4. Summary
      4. Using Virtual Private Networks
        1. What Is a Virtual Private Network?
        2. VPN Varieties
        3. Choosing a VPN Provider
        4. Configuring Your Mac for VPN Access
        5. Summary
      5. Encrypting and Securely Deleting Files
        1. File-Encryption Basics
        2. Encrypting Individual Files and Folders
        3. Working with Encrypted Disk Images
        4. Using FileVault
        5. Encrypting an Entire Disk
        6. Using Hardware-Encrypted Drives
        7. Securely Deleting Files
        8. Securely Erasing Disks
        9. Recovering Deleted Files
        10. Summary
    8. Network Security Fundamentals
      1. Guarding against Malware
        1. The Varieties of Malware
        2. Macs as Malware Carriers
        3. Assessing Your Mac's Vulnerability
        4. Common-Sense Malware Protection
        5. Choosing Anti-Malware Software
        6. Using Outbound Firewalls
        7. What Anti-Malware Software Can't Do
        8. Securing Windows on a Mac
        9. Summary
      2. Securing Your Wired Network
        1. Understanding Gateways, Modems, and Routers
        2. Understanding NAT, DHCP, and IPv6
        3. Using Port Forwarding
        4. Using a DMZ
        5. Using NAT-PMP or UPnP
        6. Using Proxy Servers
        7. Using 802.1X
        8. Summary
      3. Securing Your Wireless Network
        1. Wireless Security Basics
        2. Configuring an AirPort Base Station
        3. Configuring Third-Party Access Points
        4. Wireless Security Settings on Your Mac
        5. Using Public Wi-Fi Hotspots
        6. Using Wi-Fi Scanning Software
        7. Summary
      4. Using Firewalls
        1. Understanding How Firewalls Work
        2. Using Mac OS X's Application Firewall
        3. Using IPFW
        4. Using Other Third-Party Firewall Software
        5. Summary
      5. Web Server Security
        1. The Basics of Running a Secure Web Server
        2. Using HTTP Authentication
        3. Securing a Site with SSL
        4. Avoiding Injection Attacks
        5. Database Security
        6. Summary
      6. Using Logs
        1. Log Basics
        2. Adjusting syslogd Behavior
        3. Finding Logs
        4. Understanding the Console and System Logs
        5. Looking for Useful Information
        6. Summary
    9. Advanced Security Measures
      1. Network Scanning
        1. What Can Network Scanning Reveal?
        2. Network Mapping
        3. Port Scanning
        4. Protecting Your Macs from Network Scanning
        5. Summary
      2. Vulnerability Scanning and Testing
        1. Using Nessus
        2. Using SAINT and SAINTexploit
        3. Using Metasploit
        4. Summary
      3. Network Monitoring
        1. The Varieties of Network Monitoring
        2. Network Intrusion Detection Systems
        3. Network Intrusion Prevention Systems
        4. Information Leak Detection Systems
        5. Honeypot Monitoring
        6. Summary
      4. Monitoring File Integrity
        1. Understanding File Integrity Monitoring
        2. Tripwire
        3. Radmind
        4. Samhain
        5. Baseline
        6. Sonar
        7. Summary
      5. Forensics: Discovering What Went Wrong
        1. Overview of Computer Forensics
        2. Looking for Rogue Processes
        3. Looking for Rogue Software
        4. Using MacForensicsLab
        5. Other Forensics Tools
        6. Summary
    10. Securing Mac OS X Server
      1. Mac OS X Server Security Overview
        1. Comparing Mac OS X and Mac OS X Server
        2. Mac OS X Server Security Fundamentals
        3. Understanding Open Directory
        4. Understanding Password Server and Kerberos
        5. Choosing Which Services to Run
        6. Configuring Local User Accounts
        7. Summary
      2. Using Directory Services
        1. Configuring Open Directory
        2. Using Windows Directory Services
        3. Summary
      3. Working with SSL Certificates
        1. Certificate Overview
        2. Creating a Self-Signed Certificate
        3. Requesting a Certificate from a Certificate Authority
        4. Creating and Using a Certificate Authority
        5. Managing Certificates
        6. Summary
      4. Securing Email Services
        1. Mac OS X Mail Server Overview
        2. Configuring Authentication Options
        3. Using SSL for Email
        4. Configuring Relay Options
        5. Configuring Spam and Virus Protection
        6. Turning On the Mail Service
        7. Summary
      5. Securing File Sharing
        1. About File-Sharing Protocols
        2. Configuring AFP
        3. Configuring SMB
        4. Configuring FTP
        5. Configuring NFS
        6. Configuring a Share Point
        7. Summary
      6. Securing the Web Server
        1. Configuring Web Options
        2. Configuring Web Services
        3. Controlling Site Access with Realms
        4. Enabling SSL
        5. Configuring the Forward Proxy Server
        6. Summary
      7. Securing Other Network Services
        1. Configuring the Mac OS X Server Firewall
        2. Using Mac OS X Server's VPN Services
        3. Securing Address Book Server
        4. Securing iCal Server
        5. Securing iChat Server
        6. Securing the Mobile Access Server
        7. Securing MySQL
        8. Securing NetBoot
        9. Configuring RADIUS
        10. Summary
      8. Glossary
      9. Where to Find More Information
        1. Apple Publications
        2. Take Control ebooks
        3. Other Books
        4. Online Resources
    11. Index