13,420
edits
Changes
no edit summary
|
|
:'''System Hardening in Linux:'''
::*Purpose
::*Rule of Preventative Action
::*Rule of Separation
::*Rule of Least Privilege
:::*AAA Protocol (Authentication):
::::*PKI
::::*PAM
::::*Kerebos
|
:'''Slides (Concepts):'''
::*[ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.odp odp] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.pdf pdf] ] [ [http://cs.senecac.on.ca/~fac/sec520/slides/sec520_w3_l1.ppt ppt] ] Linux Hardening (part 1)
:'''Reading References:'''
::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )
:'''YouTube Videos:'''::*Linux Hardening:::[http://www.youtube.com/watch?v=GJMKgV8V4FI Part1] |[http://www.youtube.com/watch?v=M9LdGH_AIZo Part 2] | [http://www.youtube.com/watch?v=0tEBXWU6Au4 Part 3]::*[http://www.youtube.com/watch?v=yy1NR74ttAw&feature=results_main&playnext=1&list=PL48E055817B95897B PAM]
:'''Resources:'''
::* [http://www.linuxdoc.org/HOWTO/User-Authentication-HOWTO/x115.html Why Use PAM?]
::* [http://www.ibm.com/developerworks/linux/library/l-pam/index.html Understanding and Configuring PAM]
|
:'''Lab 4:'''
::System Hardening
::*[https://scs.senecac.on.ca/~fac/sec520/labs/SEC520_Lab_4.html Linux System Hardening (part 1)]
:'''Assignment #1 Posted:'''