Skip to Content
Security Strategies in Linux Platforms and Applications
book

Security Strategies in Linux Platforms and Applications

by Michael Jang
October 2010
Intermediate to advanced
512 pages
15h 1m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications

Chapter 12. Building and Maintaining a Security Baseline

IN THIS CHAPTER, YOU'LL REVIEW basic steps required to create an appropriate baseline system for both the Ubuntu and Red Hat distributions. As noted in previous chapters, a good baseline keeps installed software to a minimum. A good baseline is secure, with firewalls and other security controls that block unauthorized access from both external and internal sources.

Some secure baseline configurations include read-only filesystems. That's one reason for the popularity of live CD distributions. Such media can be booted on most systems, with a fully functional version of Linux loaded into system Random Access Memory (RAM). You'll examine several options for live CDs with security-management ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications, 2nd Edition

Security Strategies in Linux Platforms and Applications, 2nd Edition

Michael Jang, Ric Messier

Publisher Resources

ISBN: 9780763791896