O'Reilly logo

The Basics of Information Security, 2nd Edition by Jason Andress

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

Operating System Security

In this chapter, we explore hardening as one of the primary tools for securing the operating system and the steps that we take to do so. We also review the additional security-related software we might use to secure our systems, including anti-malware tools, software firewalls, and host-based intrusion detection systems, in order to protect us from a variety of attacks. Lastly, we touch on some of the security tools we can use from an operating system perspective, including port scanners such as Nmap, vulnerability analysis tools such as Nessus, and exploit frameworks such as Metasploit.

Keywords

Anti-malware; hardening; host intrusion detection; Metasploit; Nessus; Nmap; operating system security; software firewall; ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required