Atnaujinkite slapukų nuostatas

Foundations of Mac OS X Leopard Security [Minkštas viršelis]

  • Formatas: Paperback / softback, 455 pages
  • Serija: Foundations
  • Išleidimo metai: 29-Apr-2008
  • Leidėjas: APress
  • ISBN-10: 1590599896
  • ISBN-13: 9781590599891
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 455 pages
  • Serija: Foundations
  • Išleidimo metai: 29-Apr-2008
  • Leidėjas: APress
  • ISBN-10: 1590599896
  • ISBN-13: 9781590599891
Kitos knygos pagal šią temą:
Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DefCon and Black Hat on OS X security. What you'll learn* Security overview* Walkthroughs to secure systems* Walkthroughs and suggestions for third-party applications on systems* Mac forensics* Mac hacking* Apple wireless security* Mac OS X securityWho is this book for? A wide audience of users, power users, and administrators who wish to make sure their Mac platform is secure.
About the Authors xvii
About the Technical Reviewer xix
Acknowledgments xxi
Introduction xxiii
Part 1 The Big Picture
Security Quick-Start
3(24)
Securing the Mac OS X Defaults
3(1)
Customizing System Preferences
4(17)
Accounts Preferences
4(2)
Login Options
6(2)
Security Preferences
8(2)
FileVault
10(2)
Infrared Controls in Security Preferences
12(1)
Other System Preferences
13(1)
Software Update
14(2)
Bluetooth Security
16(3)
Printer Security
19(2)
Sharing Services
21(1)
Securely Erasing Disks
21(2)
Using the Secure Empty Trash Feature
23(1)
Using Encrypted Disk Images
24(1)
Securing Your Keychains
25(1)
Best Practices
26(1)
Security Fundamentals
27(20)
What Can Be Targeted?
28(1)
The Accidental Mac Administrator
28(1)
Kinds of Attacks
29(1)
OS 9 vs. OS X
30(1)
Darwin vs. Aqua
30(1)
Unix Security
31(1)
In the Beginning...the Command Line
32(4)
Physical Security
36(2)
Equipment Disposal
37(1)
Physical Devices and Optical Media
38(1)
Firmware and Firmware Password Protection
38(6)
Open Firmware
39(1)
EFI
39(1)
Firmware Protection
39(5)
Multifactor Authentication
44(1)
Keeping Current: The Cat-and-Mouse Game
45(1)
The NSA and the Mac
46(1)
A Word About Parallels and Boot Camp
46(1)
Securing User Accounts
47(28)
Introducing Authentication, Authorization, and Identification
47(1)
Managing User Accounts
48(14)
Introducing the Account Types
49(2)
Adding Users to Groups
51(1)
Enabling the Superuser Account
52(2)
Setting Up Parental Controls
54(6)
Managing the Rules Put in Place
60(2)
Restricting Access with the Command Line: sudoers
62(6)
Securing Mount Points
68(1)
SUID Applications: Getting into the Nitty-Gritty
69(1)
Creating Files with Permissions
70(5)
Part 2 Security Essentials
Malware Security: Combating Viruses, Worms, and Root Kits
75(18)
Classifying Threats
75(5)
The Real Threat of Malware on the Mac
77(2)
Script Virus Attacks
79(1)
Socially Engineered Viruses
79(1)
Using Antivirus Software
80(7)
Antivirus Software Woes
80(1)
Norton AntiVirus
80(1)
ClamXav
81(3)
Sophos Anti-Virus
84(2)
McAfee VirusScan
86(1)
Best Practices for Combating Viruses
86(1)
Other Forms of Malware
87(6)
Adware
87(1)
Spyware
88(1)
Root Kits
89(4)
Securing Web Browsers and E-mail
93(32)
A Quick Note About Passwords
93(1)
Securing Your Web Browser
94(9)
Securing Safari
94(3)
Securing Firefox
97(6)
Configuring Mail Securely
103(6)
Using SSL
103(3)
Securing Entourage
106(3)
Fighting Spam
109(4)
Filtering Mail for Spam
110(1)
Filtering with Entourage
111(1)
Using White Listing in Entourage
112(1)
Using PGP to Encrypt Mail Messages
113(6)
Configuring PGP Desktop
114(5)
GPG Tools
119(1)
Using Mail Server-Based Solutions for Spam and Viruses
119(5)
Kerio
120(2)
Mac OS X Server's Antispam Tools
122(1)
CommuniGate Pro
123(1)
Outsourcing Your Spam and Virus Filtering
124(1)
Reviewing Logs and Monitoring
125(24)
What Exactly Gets Logged?
125(2)
Using Console
127(2)
Viewing Logs
127(1)
Marking Logs
128(1)
Finding Logs
129(1)
Reviewing User-Specific Logs
130(2)
Reviewing Library Logs
132(3)
Secure.log: Security Information 101
133(1)
ipfw.log
133(2)
Breaking Down Maintenance Logs
135(5)
daily.out
136(1)
Yasu
137(1)
weekly.out
138(1)
monthly.out
139(1)
What to Worry About
140(1)
Parallels and Bootcamp Logs
140(3)
Event Viewer
140(2)
Task Manager
142(1)
Performance Alerts
143(1)
Review Regularly, Review Often
143(6)
Accountability
143(1)
Incident Response
144(5)
Part 3 Network Security
Securing Network Traffic
149(22)
Understanding TCP/IP
149(2)
Types of Networks
151(3)
Peer-to-Peer
151(1)
Configuring Peer-to-Peer Networks
152(1)
Client-Server Networks
153(1)
Understanding Routing
154(6)
Packets
154(3)
Port Management
157(1)
DMZ and Subnets
158(1)
Spoofing
159(1)
Stateful Packet Inspection
160(1)
Data Packet Encryption
160(1)
Understanding Switches and Hubs
160(3)
Restricting Network Services
163(1)
Security Through 802.1x
164(1)
Proxy Servers
165(2)
Squid
167(2)
A Layered Approach
169(2)
Setting Up the Mac OS X Firewall
171(26)
Introducing Network Services
171(2)
Controlling Services
173(2)
Configuring the Firewall
175(4)
Working with the Firewall in Leopard
175(2)
Working with Default Services in Tiger
177(1)
Allowing Non-Apple Services in Tiger
178(1)
Setting Advanced Features
179(3)
Testing the Firewall
182(1)
Using Mac OS X to Protect Other Computers
183(2)
Using Third-Party Firewalls
185(2)
Doorstop X
186(1)
Flying Buttress
186(1)
Working from the Command Line
187(10)
Getting More Granular Firewall Control
187(2)
Using ipfw
189(4)
Using dummynet
193(4)
Securing a Wireless Network
197(30)
Wireless Network Essentials
198(1)
Introducing Apple AirPort
199(1)
Configuring Older AirPorts
200(3)
AirPort Utility
202(1)
Configuring Current AirPorts
203(10)
Limiting the DHCP Scope
206(1)
Hardware Filtering
207(2)
AirPort Logging
209(1)
Hiding a Wireless Network
210(1)
Base Station Features in the AirPort Utility
211(1)
The AirPort Express
211(1)
Wireless Security on Client Computers
212(1)
Securing Computer-to-Computer Networks
213(1)
Wireless Topologies
214(1)
Wireless Hacking Tools
215(6)
KisMAC
215(2)
Detecting Rogue Access Points
217(1)
iStumbler and Mac Stumbler
217(3)
MacStumbler
220(1)
Ettercap
220(1)
EtherPeek
220(1)
Cracking WEP Keys
221(1)
Cracking WPA-PSK
222(1)
General Safeguards Against Cracking Wireless Networks
222(5)
Part 4 Sharing
File Services
227(188)
The Risks in File Sharing
227(1)
Peer-to-Peer vs. Client-Server Environments
227(1)
Using POSIX Permissions
228(1)
Getting More Out of Permissions with Access Control Lists
229(1)
Sharing Protocols: Which One Is for You?
230(16)
Apple Filing Protocol
231(2)
Samba
233(2)
Using Apple AirPort to Share Files
235(4)
DAVE
239(6)
FTP
245(1)
Permission Models
246(3)
Web Site Security
249(22)
Securing Your Web Server
249(3)
Introducing the httpd Daemon
250(1)
Removing the Default Files
251(1)
Changing the Location of Logs
251(1)
Managing httpd
252(2)
Using ModSecurity
252(1)
Restricting Apache Access
252(1)
Running on a Nonstandard Port
252(1)
Use a Proxy Server
253(1)
Using CGI
253(1)
Disabling Unnecessary Services in Apache
254(1)
PHP and Security
254(2)
Securing PHP
255(1)
Tightening PHP with Input Validation
255(1)
Taming Scripts
256(2)
Securing Your Perl Scripts
256(2)
Securing robots.txt
258(2)
Blocking Hosts Based on robots.txt
259(1)
Protecting Directories
260(3)
Using the .htaccess File to Customize Error Codes
261(1)
Using .htaccess to Control Access to a Directory
262(1)
Tightening Security with SSL
263(1)
Implementing Digital Certificates
264(1)
Protecting the Privacy of Your Information
264(4)
Protecting from Google?
266(1)
Enumerating a Web Server
267(1)
Securing Files on Your Web Server
268(1)
Securing Directory Listings
269(1)
Uploading Files Securely
270(1)
Cross-Site Scripting Attacks (XSS)
270(1)
Remote Connectivity
271(22)
Built-In Remote Management Applications
272(6)
Screen Sharing
272(2)
Back to My Mac
274(1)
Remote Management
275(3)
Timbuktu
278(4)
Using Secure Shell
282(2)
Further Securing SSH
283(1)
Using a VPN
284(9)
Connecting to Your Office VPN
284(1)
Setting Up PPTP
285(2)
Setting Up L2TP
287(1)
PPP+SSH=VPN
287(6)
Server Security
293(50)
Limiting Access to Services
293(1)
The Root User
294(1)
Foundations of a Directory Service
295(2)
Defining LDAP
295(1)
Defining Kerberos
296(1)
Configuring and Managing Open Directory
297(26)
Securing LDAP: Enabling SSL
300(1)
Securing Open Directory Accounts by Enabling Password Policies
301(2)
Securing Open Directory Using Binding Policies
303(2)
Securing Authentication with PasswordServer
305(2)
Securing LDAP by Preventing Anonymous Binding
307(2)
Securely Binding Clients to Open Directory
309(2)
Further Securing LDAP: Implementing Custom LDAP ACLs
311(1)
Creating Open Directory Users and Groups
311(3)
Securing Kerberos from the Command Line
314(1)
Managed Preferences
315(2)
Enhanced Security for Managed Preferences in Leopard
317(2)
Providing Directory Services for Windows Clients
319(1)
Active Directory Integration
320(3)
Web Server Security in OS X Server
323(3)
Using Realms
323(2)
SSL Certs on Web Servers
325(1)
File Sharing Security in OS X Server
326(7)
A Word About File Size
328(1)
NFS
328(1)
AFP
329(3)
SMB
332(1)
FTP
333(1)
Wireless Security on OS X Server Using RADIUS
333(1)
DNS Best Practices
334(1)
SSL
335(2)
Reimporting Certificates
337(1)
SSHD
337(1)
Server Admin from the Command Line
338(1)
iChat Server
338(1)
Securing the Mail Server
339(4)
Limiting the Protocols on Your Server
340(3)
PART 5 Workplace Secrity
Network Scanning, Intrusion Detection, and Intrusion Prevention Tools
343(30)
Scanning Techinques
343(8)
Fingerprinting
344(2)
Enumeration
346(1)
Firewalk
347(1)
Vulnerability and Port Scanning
347(4)
Other Scanning Techinques
351(1)
Intrusion Detection and Prevention
351(10)
Host Intrusion Detection System
351(2)
Using Checkmate
353(1)
Network Intrusion Detection
353(8)
Security Auditing on the Mac
361(12)
SAINT
361(1)
Nessus
362(7)
Metasploit
369(4)
Backup and Fault Tolerance
373(22)
Time Machine
373(6)
Restoring Files From Time Machine
377(1)
Using a Network Volume for Time Machine
378(1)
SuperDuper
379(1)
Backing Up to Mac
380(3)
Retrospect
383(7)
Configuring Retrospect Backup to Tape
384(4)
Installing the Retrospect Client
388(1)
Checking Your Retrospect Backups
389(1)
Using Tape Libraries
390(1)
Backup vs. Fault Tolerance
391(4)
Fault-Tolerant Scenarios
391(1)
Round-Robin DNS
392(1)
Load-Balancing Devices
393(1)
Cold Sites
393(1)
Hot Sites
393(2)
Forensics
395(20)
Incident Response
395(1)
MacForensicsLab
396(16)
Installing MacForensicsLab
397(4)
Using MacForensicsLab
401(2)
Image Acquisition
403(2)
Analysis
405(2)
Salvage
407(3)
Performing an Audit
410(1)
Reviewing the Case
411(1)
Reporting
411(1)
Other GUI Tools for Forensic Analysis
412(1)
Command-Line Tools For Forensic Analysis
413(2)
Appendix A Xsan Security 415(4)
Appendix B Acceptable Use Policy 419(6)
Appendix C Secure Development 425(2)
Appendix D Introduction to Cryptography 427(4)
Index 431