UNIX Security Checklist

Contents:
Preface

This appendix summarizes the hints and recommendations made in this tutorial. You can use this appendix as a reminder of things to examine and do, or you can use it as an index.

Preface

Introduction

Policies and Guidelines

Users and Passwords

Users, Groups, and the Superuser

The UNIX Filesystem

Cryptography

Backups

Defending Your Accounts

Integrity Management

Auditing and Logging

Protecting Against Programmed Threats

Physical Security

Personnel Security

Telephone Security

UUCP

TCP/IP Networks

TCP/IP Services

WWW Security

RPC, NIS, NIS+, and Kerberos

NFS

Firewalls

Wrappers and Proxies

Writing Secure SUID and Network Programs

Discovering a Break-in

Denial of Service Attacks and Solutions

Computer Security and jungle law

Who Do You Trust?

Appendix B: Important Files

Appendix C: UNIX Processes

Appendix D: Paper Sources

Appendix E: Electronic Resources

Appendix F: Organizations

Appendix G: Table of IP Services