Solaris 8 Security

Edgar Danielyan

Publisher: New Riders, 2001, 274 pages

ISBN: 1-57870-270-4

Keywords: IT Security

Last modified: May 5, 2021, 1:40 p.m.

Security threats and vulnerabilities are an everyday reality in today's infrastructures, and the Solaris operating system is no exception. Solaris 8 Security gives you insight into the organizational and technical approaches that are used to decrease the risks and increase the overall security of Solaris 8 systems. This practical and concise book helps you understand how to secure your Solaris 8 system by using the product's built-in security features as well as open source security tools.

Solaris 8 Security also demystifies topics such as cryptography, security policies, and risk management, presenting them in a format that is both practical and handy. Edgar Danielyan helps you understand security as a process, evaluate and quantify risks, and introduces you to the proven practices and strategies that he has developed throughout years as a UNIX system administrator.

  1. Enterprise Security Framework
    • Chapter 2: Security and Cryptography
    • Chapter 3: System Security
    • Chapter 4: Authentication and Authorization
    • Chapter 5: Kerberos
    • Chapter 6: Auditing and Accounting
    • Chapter 7: Open Source Security Tools
    • Chapter 8: Network Security
    • Chapter 9: IP Security Architecture (IPsec)
    • Chapter 10: Securing Network Services
    • Appendixes
    • Security Principles
    • The Security Process
    • Risk Management
    • Calculating Risk
    • Defining Security Policy
    • Design Vulnerabilities
    • Implementation Vulnerabilities
    • Ascertaining Your Security Requirements
    • Management Issues
    • Justifying Investing in Security
    • Security Training
    • Security Perimeter Problems
    • Access Control Models
    • Low-Cost But Effective Security Measures
    • Handling Security Incidents
    • Evaluating the Efficiency of Security Measures
    • Human Factors
    • Social Engineering
    • Remote-Access Control
    • UNIX and Security
    • Password Selection and Use
    • Security for Business
    • Summary
  2. Security and Cryptography
    • Types of Algorithms
    • Digital Certificates and Certifying Authorities (CAs)
    • Keys
    • Cryptanalysis
    • Random and Pseudo-Random Number Generators
    • Applications of Cryptography
    • Sun Crypto Accelerator I Board
    • Summary
  3. System Security
    • Installation
    • Patches and Maintenance Updates
    • Configuring for Security
    • Network Information Service Plus (NIS+) Security
    • System Identification
    • System Logs
    • /etc/issue
    • Automated Security Enhancement Tool (ASET)
    • Solaris Fingerprint Database (sfpDB)
    • www.sun.com/BigAdmin
    • Summary
  4. Authentication and Authorization
    • /etc/passwd and /etc/shadow
    • /etc/logindevperm
    • /etc/default/login
    • /etc/default/su
    • Secure Shell (SSH)
    • Name Services
    • RBAC
    • Pluggable Authentication Modules (PAM)
    • Service Access Facility (SAF)
    • Open Card Framework (OCF)
    • Kerberos
    • Point-to-Point Protocol (PPP) Security
    • Dial-Up Passwords
    • Summary
  5. Kerberos
    • What Does Kerberos Mean?
    • A Brief History of Kerberos
    • Kerberos and Solaris 8
    • Kerberos Limitations
    • Do You Need Kerberos?
    • Planning Kerberos Deployment
    • The Differences Between Kerberos 4 and 5
    • How Does Kerberos Work?
    • Configuring Kerberos
    • Kerberos and the Network File System (NFS)
    • Troubleshooting Kerberos
    • Alternatives to Kerberos
    • Summary
  6. Auditing and Accounting
    • Auditing
    • Accounting
    • Summary
  7. Open Source Security Tools
    • OpenSSH: Open Secure Shell
    • OpenSSL: Open Secure Sockets Layer Library and Tool
    • Nessus: Remote System Security Scanner
    • nmap: Network-Mapping and Port-Scanning Tool
    • sudo: Controlled su
    • lsof: List Open Files
    • ntop: Network Usage and Protocol Analyzer
    • npasswd: New passwd
    • top: Advanced ps
    • TCP Wrappers: Advanced TCP Superdaemon
    • chrootuid: Advanced chroot with the setuid Feature
    • rpcbind: More Secure rpcbind
    • logdaemon: Secure rlogind, rshd, login, rexecd, and ftpd Replacements
    • argus: Audit Record Generation and Utilization System
    • tcpdump: Network Monitoring and Data Acquisition Tool
    • libpcap: Portable Packet-Capture Library
    • genpass: Random-Password Generator
    • xinetd: Extended Internet Superdaemon
    • Summary
  8. Network Security
    • Minimization for Network Security
    • Fine-Tuning the Solaris 8 TCP/IP Stack
    • Types of Firewalls
    • Solaris Firewalls
    • Router-Based Firewalls
    • Network Intrusion Detection Systems
    • Network/Port Address Translation (NAT/PAT)
    • Network Troubleshooting
    • Remote Vulnerability Testing: Nessus
    • A Sample ndd(1M) Setup
    • Summary
  9. IP Security Architecture (IPsec)
    • Authentication Header (AH)
    • Encapsulating Security Payload (ESP)
    • IPsec Algorithms
    • Security Associations (SAs)
    • IPsec Transport Mode
    • IPsec Tunneling
    • Configuring IPsec on Solaris 8
    • IPsec Virtual Private Networks (VPNs)
    • Monitoring and Troubleshooting IPsec
    • Summary
  10. Securing Network Services
    • Securing BIND 9
    • Securing E-Mail
    • Securing FTP
    • Securing X Windows (X11)
    • Securing the Network File System (NFS)
    • Securing the World Wide Web (WWW) Service
    • Summary
  1. Internet Protocols
    • For More Information
  2. TCP and UDP Port Numbers
  3. Solaris 8 Standards Conformance
  4. Types of Attacks and Vulnerabilities
    • Attacks
    • Vulnerabilities
  5. System and Network Security Checklist
    • System Security Checklist
    • /etc
    • Network Security Checklist
  6. Security Resources
    • Web Sites
    • Mailing Lists
    • Usenet Newsgroups
    • Publications
    • Books
    • Incident Response Centers
  7. Trusted Solaris 8
    • Internal and External Threats
    • Mandatory Access Control
    • Role-Based Access Control
    • Profiles
    • Privileges
    • Labels
    • Device Access
    • Administration
    • Trusted Common Desktop Environment
    • Trusted Paths
    • Summary
  8. SunScreen 3.1 Lite
    • Installation
    • Administration
    • Rules
    • Policies
    • Objects
    • Summary

Reviews

Solaris 8 Security

Reviewed by Roland Buresund

OK ***** (5 out of 10)

Last modified: May 5, 2021, 1:43 p.m.

An OK book on IT Security, with a focus on Sun's Solaris.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required