Preface |
|
ix | |
|
1. Threat Modeling and Risk Management |
|
|
1 | (20) |
|
|
2 | (9) |
|
Simple Risk Analysis: ALEs |
|
|
11 | (4) |
|
An Alternative: Attack Trees |
|
|
15 | (3) |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
20 | (1) |
|
2. Designing Perimeter Networks |
|
|
21 | (22) |
|
|
22 | (2) |
|
Types of Firewall and DMZ Architectures |
|
|
24 | (5) |
|
Deciding What Should Reside on the DMZ |
|
|
29 | (1) |
|
Allocating Resources in the DMZ |
|
|
30 | (2) |
|
|
32 | (11) |
|
3. Hardening Linux and Using iptables |
|
|
43 | (74) |
|
|
44 | (67) |
|
Automated Hardening with Bastille Linux |
|
|
111 | (6) |
|
4. Secure Remote Administration |
|
|
117 | (26) |
|
Why It's Time to Retire Cleartext Admin Tools |
|
|
117 | (1) |
|
Secure Shell Background and Basic Use |
|
|
118 | (10) |
|
Intermediate and Advanced SSH |
|
|
128 | (15) |
|
|
143 | (25) |
|
Stunnel and OpenSSL: Concepts |
|
|
143 | (25) |
|
6. Securing Domain Name Services (DNS) |
|
|
168 | (47) |
|
|
168 | (2) |
|
|
170 | (2) |
|
Selecting a DNS Software Package |
|
|
172 | (1) |
|
|
173 | (21) |
|
|
194 | (18) |
|
|
212 | (3) |
|
7. Using LDAP for Authentication |
|
|
215 | (22) |
|
|
215 | (5) |
|
|
220 | (9) |
|
|
229 | (6) |
|
|
235 | (1) |
|
|
235 | (2) |
|
|
237 | (14) |
|
Types of Security Problems |
|
|
238 | (1) |
|
|
238 | (3) |
|
|
241 | (5) |
|
|
246 | (4) |
|
|
250 | (1) |
|
9. Securing Internet Email |
|
|
251 | (63) |
|
Background: MTA and SMTP Security |
|
|
252 | (3) |
|
Using SMTP Commands to Troubleshoot and Test SMTP Servers |
|
|
255 | (2) |
|
|
257 | (1) |
|
|
257 | (28) |
|
|
285 | (8) |
|
|
293 | (15) |
|
A Brief Introduction to Email Encryption |
|
|
308 | (3) |
|
|
311 | (3) |
10. Securing Web Servers |
|
314 | (47) |
|
|
314 | (2) |
|
|
316 | (11) |
|
|
327 | (10) |
|
|
337 | (22) |
|
|
359 | (1) |
|
|
359 | (2) |
11. Securing File Services |
|
361 | (45) |
|
|
361 | (31) |
|
Other File-Sharing Methods |
|
|
392 | (13) |
|
|
405 | (1) |
12. System Log Management and Monitoring |
|
406 | (44) |
|
|
406 | (11) |
|
|
417 | (18) |
|
Testing System Logging with logger |
|
|
435 | (1) |
|
Managing System Logfiles with logrotate |
|
|
436 | (3) |
|
Using Swatch for Automated Log Monitoring |
|
|
439 | (9) |
|
Some Simple Log-Reporting Tools |
|
|
448 | (1) |
|
|
449 | (1) |
13. Simple Intrusion Detection Techniques |
|
450 | (36) |
|
Principles of Intrusion Detection Systems |
|
|
451 | (3) |
|
|
454 | (15) |
|
|
469 | (3) |
|
|
472 | (14) |
Resources |
|
486 | (3) |
Appendix: Two Complete iptables Startup Scripts |
|
489 | (12) |
Index |
|
501 | |