Linux: Security, Audit and Control FeaturesISACA, 2005 - 158 lappuses This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, security professionals and information systems auditors. It provides the following guidance to IT management: * The business and technology drivers for Linux * The vulnerabilities of the Linux operating system * Risk management issues with an action-oriented perspective * Linux security software * How to secure Linux installations to fulfill the control objectives of two well-known standards-COBIT and ISO 17799 * Detailed internal control questionnaires. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail bookstore@isaca.org for more information. |
Bieži izmantoti vārdi un frāzes
access control allowed Apache application attacker audit auditor authentication backup Bastille Linux binaries boot Check client COBIT command compromised configuration file connections control objectives created critical daemon database default disk e-mail encryption Ensure entries etc/passwd etc/shadow file execute file system filtering firewall he/she his/her host implemented under Linux input interface Internet IP address IPTables LDAP Linux distributions Linux kernel Linux security Linux server Linux system log files login lsof mail server modify modules monitoring Nessus open source operating system options organization output package packets parameters password patches permissions port privileges procedure processes protocol provides recommended Red Hat Linux restricted root rootkits running script Security ICQ Sendmail server room shell source code specified sudo superuser syslog system administrator target TCP wrappers Telnet UNIX utilities vendor workstations xinetd