Chapter 1. Linux Security Problems

In this chapter, we will discuss the following:

  • The security policy of Linux
  • Configuring password protection
  • Configuring server security
  • Conducting integrity checks of the installation medium using checksum
  • Using the LUKS disk encryption
  • Making use of sudoers – configuring sudo access
  • Scanning hosts with Nmap
  • Gaining a root on a vulnerable Linux system

Introduction

A Linux machine is only as secure as an administrator configures it to be. Once we are done with the installation of the Linux OS and we remove its unnecessary packages after the installation has been completed, we can start working on the security aspect of the software and the services provided by the Linux machine.

Get Practical Linux Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.