Skip to Content
Security Strategies in Linux Platforms and Applications
book

Security Strategies in Linux Platforms and Applications

by Michael Jang
October 2010
Intermediate to advanced
512 pages
15h 1m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications

Chapter 13. Testing and Reporting

WHILE YOU MAY TAKE every conceivable step to secure local systems and networks, that is not enough. Tests come in real time when black-hat hackers try to break through those security measures. So before a black-hat hacker can break in, you should test systems and networks for known security issues and measures.

Any test should apply to all parts of a layered defense, from an external firewall to the passwords selected by local users. You can monitor those ports that have to be open to enable network communication. But if other ports are also open, black-hat hackers can use those ports to penetrate local systems without your knowledge. In this chapter, you'll see what ports are open and what can be done to keep ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications, 2nd Edition

Security Strategies in Linux Platforms and Applications, 2nd Edition

Michael Jang, Ric Messier

Publisher Resources

ISBN: 9780763791896