Chapter 13. Testing and Reporting

WHILE YOU MAY TAKE every conceivable step to secure local systems and networks, that is not enough. Tests come in real time when black-hat hackers try to break through those security measures. So before a black-hat hacker can break in, you should test systems and networks for known security issues and measures.

Any test should apply to all parts of a layered defense, from an external firewall to the passwords selected by local users. You can monitor those ports that have to be open to enable network communication. But if other ports are also open, black-hat hackers can use those ports to penetrate local systems without your knowledge. In this chapter, you'll see what ports are open and what can be done to keep ...

Get Security Strategies in Linux Platforms and Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.