Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
About This E-Book
Title Page
Copyright Page
Dedications
Contents at a Glance
Table of Contents
Foreword
Preface
Acknowledgments
About the Author
1. Overall Security Concepts
Section 1: Security Fundamentals
Essential Security Principles
Basic Password Security
Section 2: Security Practices Against a Knowledgeable Attacker
Security Best Practices
Password-Cracking Techniques
Password-Cracking Countermeasures
Section 3: Security Practices Against an Advanced Attacker
Advanced Password-Cracking Techniques
Advanced Password-Cracking Countermeasures
Summary
2. Workstation Security
Section 1: Security Fundamentals
Workstation Security Fundamentals
Web Security Fundamentals
Introduction to Tails
Download, Validate, and Install Tails
Use Tails
Section 2: Additional Workstation Hardening
Workstation Disk Encryption
BIOS Passwords
Tails Persistence and Encryption
Section 3: Qubes
Introduction to Qubes
Qubes Download and Installation
The Qubes Desktop
An AppVM Compartmentalization Example
Split GPG
USB VM
Summary
3. Server Security
Section 1: Server Security Fundamentals
Fundamental Server Security Practices
SSH Configuration
Sudo
Section 2: Intermediate Server-Hardening Techniques
SSH Key Authentication
AppArmor
Remote Logging
Section 3: Advanced Server-Hardening Techniques
Server Disk Encryption
Secure NTP Alternatives
Two-Factor Authentication with SSH
Summary
4. Network
Section 1: Essential Network Hardening
Network Security Fundamentals
Man-in-the-Middle Attacks
Server Firewall Settings
Section 2: Encrypted Networks
OpenVPN Configuration
SSH Tunnels
SSL/TLS-Enabled Load Balancing
Section 3: Anonymous Networks
Tor Configuration
Tor Hidden Services
Summary
5. Web Servers
Section 1: Web Server Security Fundamentals
Permissions
HTTP Basic Authentication
Section 2: HTTPS
Enable HTTPS
Redirect HTTP to HTTPS
HTTPS Reverse Proxy
HTTPS Client Authentication
Section 3: Advanced HTTPS Configuration
HSTS
HTTPS Forward Secrecy
Web Application Firewalls
Summary
6. Email
Section 1: Essential Email Hardening
Email Security Fundamentals
Basic Email Hardening
Section 2: Authentication and Encryption
SMTP Authentication
SMTPS
Section 3: Advanced Hardening
SPF
DKIM
DMARC
Summary
7. DNS
Section 1: DNS Security Fundamentals
Authoritative DNS Server Hardening
Recursive DNS Server Hardening
Section 2: DNS Amplification Attacks and Rate Limiting
DNS Query Logging
Dynamic DNS Authentication
Section 3: DNSSEC
How DNS Works
DNS Security Issues
How DNSSEC Works
DNSSEC Terminology
Add DNSSEC to a Zone
Summary
8. Database
Section 1: Database Security Fundamentals
Essential Database Security
Local Database Administration
Database User Permissions
Section 2: Database Hardening
Database Network Access Control
Enable SSL/TLS
Section 3: Database Encryption
Full Disk Encryption
Application-Side Encryption
Client-Side Encryption
Summary
9. Incident Response
Section 1: Incident Response Fundamentals
Who Performs Incident Response?
Do You Prosecute?
Pull the Plug
Image the Server
Server Redeployment
Forensics
Section 2: Secure Disk Imaging Techniques
Choose the Imaging System
Create the Image
Introduction to Sleuth Kit and Autopsy
Section 3: Walk Through a Sample Investigation
Cloud Incident Response
Summary
Appendix A. Tor
What Is Tor?
Why Use Tor?
How Tor Works
Security Risks
Outdated Tor Software
Identity Leaks
Appendix B. SSL/TLS
What Is TLS?
Why Use TLS?
How TLS Works
Deciphering Cipher Names
TLS Troubleshooting Commands
View the Contents of a Certificate
View the Contents of a CSR
Troubleshoot a Protocol over TLS
Security Risks
Man-in-the-Middle Attacks
Downgrade Attacks
Forward Secrecy
Index
Code Snippets
← Prev
Back
Next →
← Prev
Back
Next →