Creating an Incident Response Plan

Plan to be breached. Do not assume that Linux is invulnerable to attack just because some Linux users say so. It’s true that more users employ other operating systems, such as Windows, so the volume of attacks and the number of potential vulnerabilities on that operating system are higher. However, Linux systems are still vulnerable. This is especially true when you put Linux in the hands of someone who does not take the responsibilities of a system administrator seriously. Any system that is poorly administered can be breached. And the system of any user who does not take security seriously and is not careful about the websites he or she visits and the email messages he or she opens may be subject to attack. ...

Get Security Strategies in Linux Platforms and Applications, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.