๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

SELinux: NSA's Open Source Security Enhanced Linux

โœ Scribed by Bill McCarty


Book ID
127447042
Publisher
O'Reilly Media
Year
2004
Tongue
English
Weight
1 MB
Edition
1
Category
Library
ISBN-13
9780596007164

No coin nor oath required. For personal study only.

โœฆ Synopsis


The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system - including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE - all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days - when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system - are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered. A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: * A readable and concrete explanation of SELinux concepts and the SELinux security model * Installation instructions for numerous distributions * Basic system and user administration * A detailed dissection of the SELinux policy language * Examples and guidelines for altering and adding policiesWith SELinux, a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system - and who doesn't? - this book provides the means.

โœฆ Subjects


Linux / Unix


๐Ÿ“œ SIMILAR VOLUMES


SELinux by Example: Using Security Enhan
โœ Frank Mayer, Karl MacMillan, David Caplan ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Prentice Hall ๐ŸŒ English โš– 4 MB

SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel-and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distribution

Real World Linux Security (Prentice Hall
โœ Bob Toxen ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Prentice Hall ๐ŸŒ English โš– 2 MB

Stop today's most vicious Internet attackers-right in their tracks!Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or

Opinion: The financial sector's move to
โœ Jan Hichert ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 87 KB

## ZoneAlarm SMTP Processing Buffer Overflow A number of private users and some businesses could be affected by a flaw in the SMTP processing system in the ZoneAlarm firewall, which can be exploited when ZoneAlarm is configured to protect an SMTP service. It is possible for hackers to construct an