请输入您要查询的百科知识:

 

词条 蜕变:从菜鸟到Linux安全专家
释义

图书信息

作者:李洋(作者)

出版社: 电子工业出版社; 第1版 (2011年9月1日)

平装: 492页

正文语种: 简体中文

开本: 16

ISBN: 9787121144349

条形码: 9787121144349

商品尺寸: 26.2 x 18.8 x 3.2 cm

商品重量: 880 g

内容简介

本书通过实际故事场景对Linux安全技术和应用方法进行了全面、深入和系统的分析。分别从黑客攻击的基本技术、Linux面临的安全威胁、Linux系统安全管理、Linux网络服务安全管理、Linux核心安全技术等多个层面,向读者系统、全面、科学地讲述了与Linux相关的原理、技术和机制等安全方法。

本书覆盖的知识面广,基本覆盖了Linux安全的方方面面。本书适用于广大读者群,包括众多Linux安全爱好者、中高级Linux用户、IT培训人员及IT从业者,同时也兼顾网络管理员。本书也可作为高等院校计算机和信息安全专业学生的教学参考用书。

目录

目录

菜鸟前传........................................................................................................................1

第1章上司训话:网络安全态势分析......................................................................2

1.1 网络安全概述 .......................................................................................................................3

1.1.1 网络安全问题概览 .....................................................................................................3

1.1.2 国际大气候 .................................................................................................................4

1.1.3 信息安全标准化组织及标准 .....................................................................................8

1.1.4 我国的实际情况 .......................................................................................................10

1.2 严峻的网络安全现状 .........................................................................................................12

1.2.1 黑客入侵 ...................................................................................................................12

1.2.2 病毒发展趋势 ...........................................................................................................12

1.2.3 内部威胁 ...................................................................................................................12

1.2.4 自然灾害 ...................................................................................................................13

1.3 黑客的攻击手段 .................................................................................................................13

1.4 重大网络安全威胁汇总 .....................................................................................................16

1.4.1 Scanning ....................................................................................................................16

1.4.2 木马 ...........................................................................................................................17

1.4.3 拒绝服务攻击和分布式拒绝服务攻击 ...................................................................19

1.4.4 病毒 ...........................................................................................................................24

1.4.5 IP Spoofing ................................................................................................................26

1.4.6 ARP Spoofing ............................................................................................................27

1.4.7 Phishing .....................................................................................................................27

1.4.8 Botnet ........................................................................................................................30

1.4.9 跨站脚本攻击 ...........................................................................................................31

1.4.10 零日攻击(Zero Day Attack) ................................................................................32

1.4.11 “社会工程学”攻击 .............................................................................................32

1.5 构建企业安全防范体系(架构) ......................................................................................34

1.5.1 企业安全防范体系(架构)的概念 .......................................................................34

1.5.2 企业安全架构的层次结构及相关安全技术 ...........................................................35

1.5.3 企业安全防范架构设计准则 ...................................................................................36

目录

VII

1.6 总结 ....................................................................................................................................38

第2章一举两得:发现企业网络漏洞....................................................................39

2.1 正中下怀的任务 .................................................................................................................40

2.1.1 上司的考验 ...............................................................................................................40

2.1.2 打得啪啪响的如意算盘 ...........................................................................................40

2.2 发现企业网络漏洞的大致思路 .........................................................................................40

2.2.1 基本思路 ...................................................................................................................40

2.2.2 采用网络安全扫描 ...................................................................................................41

2.3 端口扫描 .............................................................................................................................42

2.3.1 端口扫描技术基本原理 ...........................................................................................42

2.3.2 端口扫描技术的主要种类 .......................................................................................43

2.3.3 快速安装Nmap .........................................................................................................46

2.3.4 使用Nmap确定开放端口 .........................................................................................47

2.4 漏洞扫描 .............................................................................................................................67

2.4.1 漏洞扫描基本原理 ...................................................................................................67

2.4.2 选择:网络漏洞扫描或主机漏洞扫描 ...................................................................68

2.4.3 高效使用网络漏洞扫描 ...........................................................................................69

2.4.4 快速安装Nessus ........................................................................................................71

2.4.5 使用Nessus扫描 ........................................................................................................73

2.5 总结 ....................................................................................................................................75

第3章初露锋芒:制定Linux系统安全保护方案..................................................76

3.1 方案的具体思路 .................................................................................................................77

3.2 圈定Linux下的重要文件 ....................................................................................................78

3.3 重要文件的权限设置 .........................................................................................................80

3.3.1 确定文件/目录访问权限 ..........................................................................................80

3.3.2 字母文件权限设定法 ...............................................................................................81

3.3.3 数字文件权限设定法 ...............................................................................................82

3.3.4 特殊访问模式及粘贴位的设定法 ...........................................................................82

3.4 使用文件系统检查工具检查文件系统 .............................................................................84

3.4.1 Tripwire工具简介 .....................................................................................................84

3.4.2 Tripwire的安装和配置 .............................................................................................86

3.4.3 使用Tripwire扫描文件系统改变 .............................................................................93

3.5 保护Linux下的进程安全 ....................................................................................................97

3.5.1 Linux下的重要进程 ..................................................................................................98

VIII

蜕变:从菜鸟到Linux安全专家

3.5.2 进程安全管理方法 .................................................................................................101

3.5.3 使用进程文件系统管理进程 .................................................................................102

3.6 保证Linux用户管理安全 ..................................................................................................106

3.6.1 用户密码管理 .........................................................................................................106

3.6.2 管理用户及组文件安全 .........................................................................................111

3.7 做好Linux下的日志管理 ..................................................................................................117

3.7.1 Linux下的日志分类 ................................................................................................117

3.7.2 Linux日志管理的基本命令 ....................................................................................118

3.8 总结 ..................................................................................................................................122

第4章 SOS:拯救崩溃的企业DNS............................................................................123

4.1 事故描述 ...........................................................................................................................124

4.2 DNS原理及安全概述 .......................................................................................................124

4.2.1 DNS简介 .................................................................................................................124

4.2.2 DNS的组成 .............................................................................................................125

4.2.3 DNS服务器的类型 .................................................................................................126

4.2.4 DNS的工作原理 .....................................................................................................126

4.2.5 DNS面临的安全威胁 .............................................................................................127

4.3 安装和启动DNS服务器 ...................................................................................................128

4.3.1 安装DNS服务器 .....................................................................................................128

4.3.2 启动和关闭DNS服务器 .........................................................................................129

4.4 安全配置DNS服务器 .......................................................................................................130

4.4.1 DNS服务器配置文件类型 .....................................................................................130

4.4.2 named.conf主配置文件 ..........................................................................................130

4.4.3 区文件 .....................................................................................................................131

4.4.4 DNS服务器配置实例 .............................................................................................133

4.4.5 安全配置DNS客户端 .............................................................................................134

4.5 安全使用DNS服务器的高级技巧 ...................................................................................136

4.5.1 配置辅助域名服务器 .............................................................................................136

4.5.2 配置高速缓存服务器 .............................................................................................137

4.5.3 配置DNS负载均衡 .................................................................................................138

4.5.4 配置智能DNS高速解析 .........................................................................................138

4.5.5 合理配置DNS的查询方式 .....................................................................................140

4.5.6 使用dnstop监控DNS流量 ......................................................................................142

4.5.7 使用DNSSEC技术保护DNS安全 ..........................................................................143

目录

IX

4.6 总结 ..................................................................................................................................145

第5章抢班夺权:搞定Web服务器管理权限........................................................146

5.1 Web服务器安全防护大赛 ................................................................................................147

5.2 Web安全构建方案之Web服务器选型 .............................................................................147

5.2.1 HTTP基本原理 .......................................................................................................147

5.2.2 为何选择Apache服务器 .........................................................................................148

5.2.3 安装Apache .............................................................................................................150

5.3 Web安全构建方案之安全配置Apache服务器 ................................................................151

5.4 Web安全构建方案之Web服务访问控制 .........................................................................156

5.4.1 访问控制常用配置指令 .........................................................................................156

5.4.2 使用.htaccess文件进行访问控制 ...........................................................................157

5.5 Web安全构建方案之使用认证和授权保护Apache ........................................................161

5.5.1 认证和授权指令 .....................................................................................................161

5.5.2 管理认证口令文件和认证组文件 .........................................................................161

5.5.3 认证和授权使用实例 .............................................................................................162

5.6 Web安全构建方案之使用Apache中的安全模块 ............................................................163

5.6.1 Apache服务器中与安全相关的模块 .....................................................................163

5.6.2 开启安全模块 .........................................................................................................164

5.7 Web安全构建方案之使用SSL保证Web通信安全 ..........................................................165

5.7.1 SSL简介 ..................................................................................................................165

5.7.2 Apache中运用SSL的基本原理 ..............................................................................166

5.7.3 使用开源的OpenSSL保护Apache通信安全 .........................................................170

5.8 Web安全构建方案之Apache日志管理和统计分析 ........................................................174

5.8.1 日志管理概述 .........................................................................................................174

5.8.2 日志相关的配置指令 .............................................................................................174

5.8.3 日志记录等级和分类 .............................................................................................175

5.8.4 使用Webalizer对Apache进行日志统计和分析 .....................................................177

5.9 Web安全构建方案之其他有效的安全措施 ....................................................................180

5.9.1 使用专用的用户运行Apache服务器 .....................................................................180

5.9.2 配置隐藏Apache服务器的版本号 .........................................................................180

5.9.3 设置虚拟目录和目录权限 .....................................................................................183

5.9.4 使Web服务运行在“监牢”中 ..............................................................................184

5.10 Web安全构建方案之将黑客拒之门外 ..........................................................................186

5.10.1 Web系统风险分析 ................................................................................................186

X

蜕变:从菜鸟到Linux安全专家

5.10.2 方案的原则和思路 ...............................................................................................187

5.10.3 网络拓扑及要点剖析 ...........................................................................................190

5.11 总结 ................................................................................................................................191

第6章顺手牵羊:窥探FTP安全问题....................................................................192

6.1 数据部门提出的FTP安全需求 ........................................................................................193

6.2 窥探FTP服务存在的安全问题 ........................................................................................193

6.3 使用vsftpd快速构建安全的FTP服务 ..............................................................................194

6.3.1 vsftpd安装 ...............................................................................................................194

6.3.2 vsftpd快速配置 .......................................................................................................194

6.3.3 vsftpd用户管理 .......................................................................................................199

6.3.4 vsftpd的高级使用方法 ...........................................................................................200

6.4 总结 ..................................................................................................................................205

第7章扬名立万:解决电子邮件安全问题..........................................................206

7.1 新的任务:解决电子邮件系统中的安全问题 ...............................................................207

7.2 电子邮件系统的组成原理 ...............................................................................................208

7.2.1 邮件传递代理(MTA) .........................................................................................208

7.2.2 邮件存储和获取代理(MSA) ............................................................................209

7.2.3 邮件客户代理(MUA) ........................................................................................209

7.3 电子邮件传输协议原理 ...................................................................................................209

7.3.1 SMTP的模型 ...........................................................................................................210

7.3.2 SMTP的基本命令 ...................................................................................................211

7.4 安全配置sendmail电子邮件服务器 .................................................................................212

7.5 安全配置使用Qmail邮件服务器 .....................................................................................221

7.6 安全Postfix电子邮件服务器 ............................................................................................222

7.6.1 安全配置Postfix邮件服务器 ..................................................................................222

7.6.2 Postfix使用SMTP安全认证 ....................................................................................224

7.7 防治垃圾邮件的主流策略和技术 ...................................................................................225

7.8 总结 ..................................................................................................................................227

第8章紧急驰援:部署代理服务..........................................................................228

8.1 紧急任务:设置代理服务 ...............................................................................................229

8.2 代理服务器原理 ...............................................................................................................229

8.2.1 代理服务器简介 .....................................................................................................229

8.2.2 代理服务器的分类 .................................................................................................231

8.3 Squid简介 ..........................................................................................................................232

目录

XI

8.4 安装和启动Squid Server ..................................................................................................232

8.5 安全配置Squid Server ......................................................................................................234

8.5.1 配置Squid Server的基本参数 ................................................................................234

8.5.2 配置Squid Server的安全访问控制 ........................................................................236

8.5.3 配置Squid Server的简单实例 ................................................................................240

8.6 安全配置基于Squid的透明代理 ......................................................................................241

8.7 安全配置多级缓存改善Proxy服务器的性能 ..................................................................243

8.7.1 多级缓存(cache)简介 ........................................................................................243

8.7.2 配置多级缓存 .........................................................................................................244

8.8 Squid日志管理 ..................................................................................................................246

8.8.1 配置文件中有关日志的选项 .................................................................................246

8.8.2 日志管理主文件——access.conf ...........................................................................247

8.9 在客户端使用Squid Server ..............................................................................................249

8.9.1 在IE浏览器中设置 .................................................................................................249

8.9.2 在Linux下的Mozilla浏览器中设置 .......................................................................251

8.10 配置带认证的代理服务 .................................................................................................253

8.11 配置反向代理服务器 .....................................................................................................253

8.11.1 反向代理服务器原理 ...........................................................................................253

8.11.2 使用Squid配置反向代理服务器 ..........................................................................254

8.12 总结 ................................................................................................................................256

第9章黎明前的黑暗:做好远程监控和管理......................................................257

9.1 一劳永逸,搞定远程监控和管理 ...................................................................................258

9.2 远程监控和管理概述 .......................................................................................................258

9.2.1 远程监控与管理的原理 .........................................................................................258

9.2.2 远程监控与管理的主要应用范围 .........................................................................259

9.2.3 远程监控及管理的基本内容 .................................................................................259

9.2.4 远程监控及管理的软、硬件要求 .........................................................................260

9.3 使用SSH安全远程访问 ....................................................................................................261

9.3.1 SSH服务简介 ..........................................................................................................261

9.3.2 安装最新版本的OpenSSH .....................................................................................263

9.3.3 安全配置OpenSSH .................................................................................................264

9.3.4 SSH的密钥管理 ......................................................................................................267

9.3.5 使用scp命令远程复制文件 ....................................................................................269

9.3.6 使用SSH设置“加密通道” ..................................................................................270

XII

蜕变:从菜鸟到Linux安全专家

9.3.7 配置SSH的客户端 ..................................................................................................271

9.3.8 配置SSH自动登录 ..................................................................................................275

9.4 使用Xmanager 3.0实现Linux远程登录管理 ...................................................................278

9.4.1 配置Xmanager服务器端 ........................................................................................278

9.4.2 配置Xmanager客户端 ............................................................................................279

9.5 使用VNC实现Linux的远程管理 .....................................................................................282

9.5.1 VNC简介 .................................................................................................................282

9.5.2 启动VNC服务器 .....................................................................................................282

9.5.3 使用VNC Viewer实现Linux远程管理 ...................................................................284

9.5.4 使用SSH+VNC实现安全的Linux远程桌面管理..................................................285

9.6 使用VPN技术保障数据通信的安全 ...............................................................................288

9.6.1 VPN简介 .................................................................................................................288

9.6.2 VPN的分类 .............................................................................................................289

9.6.3 Linux下的VPN ........................................................................................................292

9.6.4 使用SSL VPN:OpenVPN .....................................................................................295

9.6.5 使用IPSec VPN .......................................................................................................299

9.7 总结 ..................................................................................................................................306

第10章新官上任“第一把火”:解决共享服务安全问题................................307

10.1 Samba服务简介 ..............................................................................................................308

10.2 安装和启动Samba ..........................................................................................................309

10.3 安全配置Samba服务器的用户信息 ..............................................................................311

10.4 安全配置smb.conf文件 ..................................................................................................312

10.5 smb.conf中的选项和特定约定 ......................................................................................327

10.6 使用testparm命令测试Samba服务器的配置安全 ........................................................331

10.7 使用Samba日志 ..............................................................................................................332

10.8 Linux和Windows文件互访 ............................................................................................332

10.9 NFS服务概述 ..................................................................................................................334

10.9.1 NFS基本原理 ........................................................................................................335

10.9.2 NFS服务中的进程 ................................................................................................337

10.10 安装和启动NFS ............................................................................................................337

10.11 NFS安全配置和使用 ....................................................................................................338

10.11.1 配置NFS服务器 ..................................................................................................338

10.11.2 配置NFS客户机 ..................................................................................................339

10.11.3 安全使用NFS服务 ..............................................................................................341

目录

XIII

10.12 保证NFS安全的使用原则 ............................................................................................342

10.13 总结 ...............................................................................................................................343

第11章新官上任“第二把火”:Linux网络防火墙安全解决方案..................344

11.1 防火墙技术简介 .............................................................................................................345

11.1.1 防火墙简介 ...........................................................................................................345

11.1.2 防火墙的分类 .......................................................................................................346

11.1.3 传统防火墙技术 ...................................................................................................348

11.1.4 新一代防火墙的技术特点 ...................................................................................349

11.1.5 防火墙技术的发展趋势 .......................................................................................351

11.1.6 防火墙的配置方式 ...............................................................................................352

11.2 Netfilter/Iptables防火墙框架技术原理 ..........................................................................353

11.2.1 Linux中的主要防火墙机制演进 ..........................................................................353

11.2.2 Netfilter/Iptables架构简介 ....................................................................................353

11.2.3 Netfilter/Iptables模块化工作架构 ........................................................................355

11.2.4 安装和启动Netfilter/Iptables系统 ........................................................................356

11.2.5 使用Iptables编写防火墙规则 ...............................................................................357

11.3 使用Iptables编写规则的简单应用 .................................................................................359

11.4 使用Iptables完成NAT功能 .............................................................................................364

11.4.1 NAT简介 ................................................................................................................364

11.4.2 NAT的原理 ...........................................................................................................364

11.4.3 NAT的具体使用方法 ...........................................................................................365

11.5 防火墙与DMZ的配合使用 ............................................................................................368

11.5.1 DMZ原理 ..............................................................................................................368

11.5.2 构建DMZ ..............................................................................................................369

11.6 防火墙的实际安全部署建议 .........................................................................................373

11.6.1 方案一:错误的防火墙部署方式 .......................................................................373

11.6.2 方案二:使用DMZ ..............................................................................................373

11.6.3 方案三:使用DMZ+二路防火墙 ........................................................................374

11.6.4 方案四:通透式防火墙 .......................................................................................375

11.7 总结 ................................................................................................................................375

第12章新官上任“第三把火”:入侵检测方案................................................376

12.1 入侵检测技术简介 .........................................................................................................377

12.1.1 入侵检测技术的原理简介 ...................................................................................377

12.1.2 入侵检测技术的发展 ...........................................................................................377

XIV

蜕变:从菜鸟到Linux安全专家

12.1.3 入侵检测的分类 ...................................................................................................379

12.1.4 入侵检测系统分类 ...............................................................................................380

12.2 安装和配置Snort ............................................................................................................383

12.2.1 安装Snort ..............................................................................................................383

12.2.2 配置Snort ..............................................................................................................384

12.3 编写Snort规则 ................................................................................................................395

12.4 总结 ................................................................................................................................402

后记........................................................................................................................403

附录A Linux常用命令............................................................................................404

随便看

 

百科全书收录4421916条中文百科知识,基本涵盖了大多数领域的百科知识,是一部内容开放、自由的电子版百科全书。

 

Copyright © 2004-2023 Cnenc.net All Rights Reserved
更新时间:2024/12/24 3:26:11