Introduction to Redhat Linux Host Security
Intruders are constantly trying to break into systems, snoop around, steal software, and corrupt programs. Intruders are not particular about their targets.
Small systems are just as vulnerable as large ones.
Once your system has been compromised, it can no longer be trusted, so you can save yourself time and money by being prepared.
This module discusses techniques to protect your system from unwanted intruders.
By learning what intruders do when they break into your system, you will be able to better defend yourself against a break-in.
You will also learn about known security problems and how to correct them. The techniques to determine whether or not your system
has been compromised will also be discussed.
After completing this module, you should be able to:
Explain why it's important to protect your console
Describe security concerns related to network access
Explain how crackers get into a system
Describe what crackers do
List ways to detect attacks
Describe insecure remote login services
Describe secure remote login services
Control the root login process
Explain the use of the
Find modified and sticky files
Describe RPM verification
In the next lesson, protecting your console access will be discussed..