Chapter 4. Mining the Data Monster

Computer security is a constant process, not a product, and not following it can prove disastrous. Generally speaking, the security process goes something like this:

  1. After configuring your system as securely as possible with help from the resources discussed in this chapter, you, or some other party, discover a vulnerability.

  2. An exploit for that vulnerability becomes public knowledge.

  3. Your system’s vendor responds, typically with a patch or upgrade.

  4. By staying on top of alerts posted by vendors and security organizations, you learn of the exploit, ...

Get Maximum Security, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.