Chapter 25. Mining the Data Monster

In This Chapter

Computer security is a process, not a product. The process is constant, and not following it can prove disastrous. Generally speaking, the security process goes something like this:

  1. After configuring your system as securely as possible with help from resources discussed in this chapter, you, or some other party, discover a vulnerability.

  2. An exploit for that vulnerability becomes public knowledge.

  3. Your system's vendor responds, typically with a patch or upgrade.

  4. By staying on top of alerts posted by vendors and security organizations, you learn ...

Get Maximum Security, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.