Advertisement

From Newbie to Power User

  • Thomas C. Greene

Abstract

So far, we’ve learned about the most common methods of attack and the system weaknesses most often exploited, and we’ve taken steps to improve security: installing Mozilla on Windows, disabling unnecessary services, removing or replacing insecure clients, and setting up a multiuser system with sensible permissions. These steps are meant to simplify our systems so that during an attack or under the influence of malware, fewer things can be made to go wrong. We’ve been relying on passive defense: narrowing our target profile and removing unnecessary features that attackers and malware can leverage against us. But there is more to security than denying assistance to attackers; there are, in fact, a number of deliberate steps we can take to monitor our systems, investigate suspicious behavior, and take action. In this chapter, we’ll learn about tools of active defense that we can use to enhance security and thwart attacks.

Keywords

Power User Secure Socket Layer Window User Encrypt File Pretty Good Privacy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Thomas C. Greene 2004

Authors and Affiliations

  • Thomas C. Greene
    • 1
  1. 1.Elsevier ScienceUK

Personalised recommendations