Chapter 1. Operating System Security

In this chapter we will cover the following topics:

  • Using Tripwire for file integrity checking
  • Using immutable files to prevent modifications
  • Closing vulnerable network ports and services
  • Using network security kernel tunables to protect your system
  • Using TCP wrappers to allow and deny remote connections
  • Enforcing the use of strong passwords and restricting the use of previous passwords
  • Restricting direct login and su access
  • Securing SSH login

Introduction

The number of security threats related to operating systems and databases are increasing every day, and this trend is expected to continue. Therefore, effective countermeasures to reduce or eliminate these threats must be found and applied. The database administrators ...

Get Oracle 11g Anti-hacker's Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.