Skip to Content
Security Strategies in Linux Platforms and Applications, 2nd Edition
book

Security Strategies in Linux Platforms and Applications, 2nd Edition

by Michael Jang, Ric Messier
October 2015
Intermediate to advanced
514 pages
16h 19m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 2nd Edition

CHAPTER

1

Security Threats to Linux

ONE OF THE MOST SIGNIFICANT ATTACKS in the more than 40-year history of the Internet happened in the late 1980s. The overall numbers may not have been impressive, but when you look at it from a percentage perspective, it may have been the most devastating attack ever. In November of 1988, Robert T. Morris released a worm from a system located at the Massachusetts Institute of Technology (MIT), although he was at Cornell. The worm is estimated to have attacked 10 percent of the systems that were then connected to the Internet. The impact of the attack continued over several days while various networks that were attached to the NSFNet backbone were disconnected to get systems restored and patched. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications

Michael Jang

Publisher Resources

ISBN: 9781284090659