Chapter 11

Chapter 11 - Linux Networking and Security Chapter 11...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Linux Networking and Security Chapter 11 Network Security Fundamentals
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network Security Fundamentals Summarize the types of network security breaches that crackers attempt Describe how to use special routing techniques to protect local network traffic Configure a basic Linux firewall Use networking utilities and techniques that protect network traffic through encryption
Background image of page 2
Reviewing Threats to Your Network Trojan Horses are programs concealed within other programs that you intentionally install Once installed, the host program of the Trojan Horse appears to do one thing, but does another One means of protection is to install programs from only trustworthy sources Viruses and Worms are designed to replicate themselves once they have been installed Linux is rarely the subject of virus attacks Worms pose a greater threat to Linux
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Reviewing Threats to Your Network Denial-of-Service (DoS) attacks occur when a cracker overwhelms a system and causes it to shut down, or become unusable Two common methods are to overwhelm with network traffic and to execute network requests Buffer overflow attacks refer to any cracker attack that exploits a programming flaw The result can cause a network service to shut down, corrupt data, or provide unexpected access to a system
Background image of page 4
Reviewing Threats to Your Network Spoofing is the forging of addresses crackers use IP and DNS spoofing Man-in-the-middle attacks are those in which a cracker intercepts a communication, reads or alters it, and leads the originator of the packet to believe the intended recipient has received it Another type of this attack is Web spoofing, where a user is linked to a cracker’s site when they believe they are linked to another
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Reviewing Threats to Your Network
Background image of page 6
Using Advanced Routing and Firewalls A firewall typically refers to a packet filter - access control operating at the lowest level of the networking protocol stack Firewalls rely on rules, the configuration settings that define certain characteristics of an IP package and the action to take for packages meeting the specified criteria Networking stacks in Linux are contained in the kernel and advanced routing and firewalls are implemented using the same Linux tools
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Using Advanced Routing and Firewalls
Background image of page 8
Introducing IP Chains The IP Chains feature of Linux allows for the setup of a chain: a list of rules for how packets are handled Input chains: packets coming from outside the system on which the rule is executed pass through Forward chains: packets coming from outside the system on which the rule is executed and that need to be routed to another system pass through
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/03/2008 for the course IT IT taught by Professor Freebourn during the Spring '07 term at Montana Tech.

Page1 / 45

Chapter 11 - Linux Networking and Security Chapter 11...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online