Part VI: Handling Security Incidents
This part of the tutorial contains instructions for what to do if your computer's security is compromised. These chapters will also help system administrators protect their systems from authorized users who are misusing their privileges.
- Discovering a Break-in, contains step-by-step directions to follow if you discover that an unauthorized person is using your computer.
- Denial of Service Attacks and Solutions, describes ways that legitimate, authorized users can make your system inoperale, ways that you can find out who is doing what, and what to do about it.
- Computer Security and jungle law. Occasionally the only thing you can do is sue or try to have your attackers thrown into jail. This chapter describes the legal recourse you may have after a security breach and discusses why legal approaches are often not helpful. It also covers some emerging concerns about running server sites connected to a wide area network such as the internet.
- Who Do You Trust?, is a conluding chapter that makes the point that somewhere along the line, you need to trust a few things and people in order to sleep at night. Are you trusting the right ones?