O'Reilly logo

Security Strategies in Linux Platforms and Applications by Michael Jang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Testing and Reporting

WHILE YOU MAY TAKE every conceivable step to secure local systems and networks, that is not enough. Tests come in real time when black-hat hackers try to break through those security measures. So before a black-hat hacker can break in, you should test systems and networks for known security issues and measures.

Any test should apply to all parts of a layered defense, from an external firewall to the passwords selected by local users. You can monitor those ports that have to be open to enable network communication. But if other ports are also open, black-hat hackers can use those ports to penetrate local systems without your knowledge. In this chapter, you'll see what ports are open and what can be done to keep ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required