This book is divided into six parts; it includes 26 chapters and 5 appendixes.
Part I, provides a basic introduction to computer security, the Unix operating system, and security policy. The chapters in this book are designed to be accessible to both users and administrators.
Chapter 1, takes a very basic look at several basic questions: What is computer security? What is an operating system? What is a deployment environment? It also introduces basic terms we use throughout the book.
Chapter 2, explores the history of the Unix operating system, and discusses the way that Unix history has affected Unix security.
Chapter 3, examines the role of setting good policies to guide the protection of your systems. It also describes the trade-offs you will need to make to account for cost, risk, and corresponding benefits.
Part II, provides a basic introduction to Unix host security. The chapters in this part of the book are also designed to be accessible to both users and administrators.
Chapter 4, is about Unix user accounts. It discusses the purpose of passwords, explains what makes good and bad passwords, and describes how the crypt( ) password encryption system works.
Chapter 5, describes how Unix groups can be used to control access to files and devices. It discusses the Unix superuser and the role that special users play. This chapter also introduces the Pluggable Authentication Module (PAM) system.
Chapter 6, discusses the security provisions of the Unix filesystem and tells how to restrict access to files and directories to the file’s owner, to a group of people, or to everybody using the computer system.
Chapter 7, discusses the role of encryption and message digests in protecting your security.
Chapter 8. What if somebody gets frustrated by your super-secure system and decides to smash your computer with a sledgehammer? This chapter describes physical perils that face your computer and its data and discusses ways of protecting against them.
Chapter 9, explores who you employ and how they fit into your overall security scheme.
Part III, describes the ways in which individual Unix computers communicate with one another and the outside world, and the ways in which these systems can be subverted by attackers who are trying to break into your computer system. Because many attacks come from the outside, this part of the book is vital reading for anyone whose computer has outside connections.
Chapter 10, describes how modems work and provides step-by-step instructions for testing your computer’s modems to see if they harbor potential security problems.
Chapter 11, provides background on how TCP/IP networking programs work and describes the security problems they pose.
Chapter 12, the longest chapter in this book, explores the most common TCP and UDP services and how you can secure them.
Chapter 13, one of the shortest chapters in the book, looks at the Remote Procedure Call system developed in the 1980s by Sun Microsystems. This RPC system is the basis of NFS and a number of other network-based services.
Chapter 14, discusses services for authenticating individuals over a network: NIS, NIS+, Kerberos, and LDAP. It continues the discussion of the PAM system.
Chapter 15, describes both Sun Microsystems’ Network Filesystem (NFS) and the Windows-compatible Server Message Block (SMB)—in particular, the Samba system.
Chapter 16, describes common pitfalls you might encounter when writing your own software. It gives tips on how to write robust software that will resist attack from malicious users. This information is particularly important when developing network servers.
Part IV, is directed primarily towards Unix system administrators. It describes how to configure Unix on your computer to minimize the chances of a break-in, as well as to limit the opportunities for a nonprivileged user to gain superuser access.
Chapter 17, discusses strategies for downloading security patches and keeping your operating system up to date.
Chapter 18, discusses why and how to make archival backups of your storage. It includes discussions of backup strategies for different types of organizations.
Chapter 19, describes ways that an attacker might try to initially break into your computer system. By finding these “doors” and closing them, you increase the security of your system.
Chapter 20, discusses how to monitor your filesystem for unauthorized changes. This chapter includes coverage of the use of message digests and read-only disks, and the configuration and use of the Tripwire utility.
Chapter 21, discusses the logging mechanisms that Unix provides to help you audit the usage and behavior of your system.
Part V, contains instructions for what to do if your computer’s security is compromised. This part of the book will also help system administrators protect their systems from authorized users who are misusing their privileges.
Chapter 22, contains step-by-step directions to follow if you discover that an unauthorized person is using your computer.
Chapter 23, discusses approaches for handling computer worms, viruses, Trojan Horses, and other programmed threats.
Chapter 24, describes ways that both authorized users and attackers can make your system inoperable. We also explore ways that you can find out who is doing what, and what to do about it.
Chapter 25. Occasionally, the only thing you can do is sue or try to have your attackers thrown in jail. This chapter describes legal recourse you may have after a security breach and discusses why legal approaches are often not helpful. It also covers some emerging concerns about running server sites connected to a wide area network such as the Internet.
Chapter 26, makes the point that somewhere along the line, you need to trust a few things, and people. We hope you are trusting the right ones.
Part VI, contains a number of useful lists and references.
Appendix A, contains a point-by-point list of many of the suggestions made in the text of the book.
Appendix B, is a technical discussion of how the Unix system manages processes. It also describes some of the special attributes of processes, including the UID, GID, and SUID.
Appendix C, lists books, articles, and magazines about computer security.
Appendix D, is a brief listing of some significant security tools to use with Unix, including descriptions of where to find them on the Internet.
Appendix E, contains the names, telephone numbers, and addresses of organizations that are devoted to ensuring that computers become more secure.
Get Practical UNIX and Internet Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.