Solaris CX-310-301 Bedienungsanleitung Seite 9

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 77
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 8
Solaris 9 Security CX-310-301 8
The Set-Uid and Set-Gid Permissions ................................................................................... 57
Implications of Lax File and Directory Permissions................................................................ 57
Access Control Lists (ACL) ........................................................................................................ 58
Identifying an ACL .................................................................................................................. 58
Setting ACLs........................................................................................................................... 59
Modifying an ACL ................................................................................................................... 59
Deleting an ACL ..................................................................................................................... 60
Recalculating the Mask of an ACL ......................................................................................... 60
PAM and Kerberos..................................................................................................................... 60
Pluggable Authentication Module (PAM) ............................................................................... 60
Deploying PAM in a Production Environment ........................................................................ 61
Add a new PAM Module......................................................................................................... 61
Kerberos / SEAM.................................................................................................................... 62
How Kerberos Works ............................................................................................................. 62
Limitations of Kerberos........................................................................................................... 62
Host and Network Prevention ...................................................................................... 63
Fundamentals ............................................................................................................................ 63
Firewall ................................................................................................................................... 63
IPsec....................................................................................................................................... 64
Network Intrusion ................................................................................................................... 64
Intrusion Detection ................................................................................................................. 64
Restricting Network Services ..................................................................................................... 64
Inetd Services......................................................................................................................... 64
Run Control Services ............................................................................................................. 65
Remote Procedure Call (RPC) Services ................................................................................ 65
Host Hardening .......................................................................................................................... 65
Solaris Security Toolkit .............................................................................................................. 66
Installing SST ......................................................................................................................... 67
Configuring SST ..................................................................................................................... 67
Running SST .......................................................................................................................... 68
Updating an SST Run ............................................................................................................ 69
Seitenansicht 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 76 77

Kommentare zu diesen Handbüchern

Keine Kommentare