Many
Manuals
search
Categorias
Marcas
Principal
Solaris
Software
CX-310-301
Manual do Utilizador
Solaris CX-310-301 Manual do Utilizador Página 40
Descarregar
Partilhar
Partilha
Adicionar aos meus manuais
Imprimir
Página
/
77
Índice
MARCADORES
Avaliado
.
/ 5. Com base em
avaliações de clientes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
Solaris 9 Security CX-310-301
39
The result is sh
own in the ne
xt screenshot.
1
2
...
35
36
37
38
39
40
41
42
43
44
45
...
76
77
Introduction
2
Exam Time Tips
2
Additional Resources
3
Operating System
11
Good Security
12
Security Awareness
13
Security Policies
13
Policies and Procedures
13
Physical Security
14
Platform Security
14
Network Security
14
Insecure Systems
15
Application Security
15
Confidentiality
18
Integrity
18
Non-repudiation
18
Attackers
18
Information Gathering
19
Gathering Techniques
20
Evaluation Standards
22
Invalidating a Certification
23
System Log Files
25
/var/adm/messages
25
SU logging
26
Using Multiple Files
29
Process Accounting
30
Overview
30
Enabling BSM
31
Generating an Audit
32
Interpreting the Results
33
The audit command
33
Audit Log Files
33
Disabling BSM
34
Device Management
34
Security Attacks
36
Preventing DoS Attacks
37
How DoS Attacks Execute
37
Privilege Escalation Attacks
38
Types of Attack
38
Detecting Attacks
39
Using File Listings
41
Using Checksums
41
Using File Digests
41
Using the find Command
42
Using Tripwire
43
Kernel Trust and OpenBoot
46
OpenBoot
46
User Account Protection
47
Expiring Accounts
47
Restricting root Logins
49
Dormant Accounts
49
Protecting Passwords
50
Users with No Password
51
Password Aging
51
Password Cracking Tools
52
Non-Login Accounts
54
User Security with SU
54
Role Based Access Control
55
Creating A Profile
56
Creating a Role
56
Assigning a Role to a User
56
Logging in to a Role
57
Listing Roles for a User
57
Listing Profiles for a Role
57
Permissions
57
Directories and Files
57
Access Control Lists (ACL)
59
Identifying an ACL
59
Setting ACLs
60
Modifying an ACL
60
Deleting an ACL
61
PAM and Kerberos
61
Add a new PAM Module
62
Kerberos / SEAM
63
How Kerberos Works
63
Limitations of Kerberos
63
Host and Network Prevention
64
Network Intrusion
65
Intrusion Detection
65
Restricting Network Services
65
Inetd Services
65
Run Control Services
66
Host Hardening
66
Solaris Security Toolkit
67
Installing SST
68
SUNWjass-4.0.1.pkg.Z
68
Configuring SST
68
Running SST
69
Updating an SST Run
70
Undoing SST
70
Verifying SST
71
Encryption
72
Logging
74
Validating TCP Wrappers
74
Cryptology
75
Terminology
75
Solaris Secure Shell
75
Configuring the Client
76
Configuring the Server
76
Starting and Stopping SSHD
76
Generating a Client Key
77
Using ssh
77
Comentários a estes Manuais
Sem comentários
Publish
Imprimir documento
Imprimir página 40
Comentários a estes Manuais