The Concept of Security
"We're not a security guard company. We sell a *concept* of security."-- Michael Kaye, president of Westec, a residential security company.
Title: Secrets of Computer Espionage: Tactics and CountermeasuresAuthor: Joel McNamaraISBN: 0-7645-3710-5Publisher: Wiley
As I sat one morning working on some loose ends, my e-mail inbox signaled the arrival of some new message. Experience is the best teacher, and my experience told me this was a new worm or virus.
The attachment was zipped, so I saved it to my Windows desktop and then FTPed it to one of my Linux boxes. Once there, I was safe to play with it the way a cat plays with a small mouse it caught. Such is the nature of security today. What I once loathed, I now treat as a daily component of handling information.
The security layer is not as static as other parts of the information infrastructure; it changes and evolves new countermeasures constantly. I don't try to keep up with everything, but I do pay attention. Two books have caught my attention, one because it is a cookbook for Linux security, a time saver, and the other because it covers other things I don't deal with, but having the knowledge helps one make connections. My third and more personal reason is I do not like being surprised. When you have enough bad experiences with security issues, you come to understand this.
Secrets of Computer Espionage is an informative--and if you're a geek--an entertaining book. My expectation was this book would point me to a number of security-oriented Web sites, which it does. But as the author explains, spying techniques and countermeasures also should explore concepts of what you should protect, risk analysis in making determinations and even who are potential spies.
It would be enough if all the book covers is computer security, but it goes beyond that to electronic devices such as faxes, shredders, cell phones, PDAs and MP3 players. Many of the listed Web sites have a Windows orientation, but it's not exclusive. Linux and UNIX are included in this party.
As I'm not a security or "spook" type, I give the topic the time slice I can afford to allocate to it so I can do what I need to do, but this book has pushed security and how I think about it to a different level. My advice is the next time you go to your local bookseller, locate a copy, buy a cup of coffee and spend some time with it. I bet you'll be hooked.
The Linux Security Cookbook is much more focused in its scope, concentrating on providing recipes that readers can put quickly into use. The book is ideal for a Linux sysadmin in a small shop, where he/she is all things to all users. This book is not the complete and final word on Linux security, and it doesn't try to be. Instead, it is a series of security HOWTOs aimed at helping a system administrator make the best use of their time.
In my job as a UNIX/Linux support engineer, I deal with a focused area (High Availability clusters) and often deal with sysadmins who have little or no experience with a problem they encounter. Many of them, especially from smaller shops, are apologetic about their ignorance on some topic of HA clustering. I dismiss this immediately and tell them that when I was a sysadmin it was the same for me. The important thing is not knowing all the information, but knowing where to find it.
A short summary of the topics covered in this book begins with Tripwire and moves on to topics such as iptable and ipchains, network access control, authentication control, testing and monitoring. This is not a book I would read for recreational purposes, but it is a book I would reach for when some security issue has raised a red flag or when I feel I need to be proactive on some issue.
Frank Conley is a UNIX support engineer for Hewlett-Packard. He has been working and playing with Linux since 1995 and welcomes your comments.
|Using Salt Stack and Vagrant for Drupal Development||May 20, 2013|
|Making Linux and Android Get Along (It's Not as Hard as It Sounds)||May 16, 2013|
|Drupal Is a Framework: Why Everyone Needs to Understand This||May 15, 2013|
|Home, My Backup Data Center||May 13, 2013|
|Non-Linux FOSS: Seashore||May 10, 2013|
|Trying to Tame the Tablet||May 08, 2013|
- RSS Feeds
- Making Linux and Android Get Along (It's Not as Hard as It Sounds)
- Using Salt Stack and Vagrant for Drupal Development
- New Products
- Validate an E-Mail Address with PHP, the Right Way
- Drupal Is a Framework: Why Everyone Needs to Understand This
- A Topic for Discussion - Open Source Feature-Richness?
- Download the Free Red Hat White Paper "Using an Open Source Framework to Catch the Bad Guy"
- Tech Tip: Really Simple HTTP Server with Python
- Home, My Backup Data Center
- Android is Linux -- why no better inter-operation
1 hour 33 min ago
- Connecting Android device to desktop Linux via USB
2 hours 1 min ago
- Find new cell phone and tablet pc
2 hours 59 min ago
4 hours 28 min ago
- Automatically updating Guest Additions
5 hours 37 min ago
- I like your topic on android
6 hours 23 min ago
- Reply to comment | Linux Journal
6 hours 44 min ago
- This is the easiest tutorial
12 hours 59 min ago
- Ahh, the Koolaid.
18 hours 37 min ago
- git-annex assistant
1 day 37 min ago
Free Webinar: Linux Backup and Recovery
Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.
In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.