source: postlfs/security/security.xml@ b4b71892

10.0 10.1 11.0 6.0 6.1 6.2 6.2.0 6.2.0-rc1 6.2.0-rc2 6.3 6.3-rc1 6.3-rc2 6.3-rc3 7.10 7.4 7.5 7.6 7.6-blfs 7.6-systemd 7.7 7.8 7.9 8.0 8.1 8.2 8.3 8.4 9.0 9.1 basic bdubbs/svn elogind gnome kde5-13430 kde5-14269 kde5-14686 ken/refactor-virt krejzi/svn lazarus nosym perl-modules qt5new systemd-11177 systemd-13485 trunk xry111/git-date xry111/git-date-for-trunk xry111/git-date-test
Last change on this file since b4b71892 was b4b71892, checked in by Bruce Dubbs <bdubbs@…>, 17 years ago

New XML Chapter 4

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@2288 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 2.1 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
3 "http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6]>
7
8<chapter id="postlfs-security">
9<?dbhtml filename="security.html"?>
10<title>Security</title>
11
12<para>Security takes many forms in a computing environment. This chapter
13gives examples of three different types of security: access, prevention
14and detection.</para>
15
16<para>Access for users is usually handled by <command>login</command> or an
17application designed to handle the login function. In this chapter, we show
18how to enhance <command>login</command> by setting policies with
19<application><acronym>PAM</acronym></application> modules. Access via networks
20can also be secured by policies set by <application>iptables</application>,
21commonly referred to as a firewall.</para>
22
23<para>Prevention of breaches, like a trojan, are assisted by applications like
24<application>GnuPG</application>, specifically the ability to confirm signed
25packages, which recognizes modifications of the <acronym>TAR</acronym> ball after
26the packager creates it.</para>
27
28<para> Finally, we touch on detection with a package that stores "signatures"
29of critical files (defined by the administrator) and then regenerates those
30"signatures" and compares for files that have been changed.</para>
31
32<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="cracklib.xml"/>
33<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="linux_pam.xml"/>
34<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="shadow.xml"/>
35<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="iptables.xml"/>
36<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="firewalling.xml"/>
37<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="gnupg.xml"/>
38<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="tripwire.xml"/>
39<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="heimdal.xml"/>
40<xi:include xmlns:xi="http://www.w3.org/2003/XInclude" href="mitkrb.xml"/>
41
42</chapter>
Note: See TracBrowser for help on using the repository browser.