ch12 08


[Chapter 12] 12.8 Words to the Wise Chapter 12Network Security  12.8 Words to the Wise I am not a security expert; I am a network administrator. In my view, good security is good system administration and vice versa. Most of this chapter is just common-sense advice. It is probably sufficient for most circumstances, but certainly not for all.Make sure you know whether there is an existing security policy that applies to your network or system. If there are policies, regulations, or laws governing your situation, make sure to obey them. Never do anything to undermine the security system established for your site.No system is completely secure. No matter what you do, you will have problems. Realize this and prepare for it. Prepare a disaster recovery plan and do everything necessary, so that when the worst does happen, you can recover from it with the minimum possible disruption.A good listing of available security publications can be found at http://csrc.nist.gov/secpub. If you want to read more about security, I recommend the following:RFC 1244, Site Security Handbook, P. Holbrook, J. Reynold, et al., July 1991.RFC 1281, Guidelines for the Secure Operation of the Internet, R. Pethia, S. Crocker, and B. Fraser, November 1991.Practical UNIX and Internet Security, Simson Garfinkel and Gene Spafford, O'Reilly & Associates, 1996.Building Internet Firewalls, Brent Chapman and Elizabeth Zwicky, O'Reilly & Associates, 1995.Computer Security Basics, Deborah Russell and G. T. Gangemi, Sr., O'Reilly & Associates, 1991.Firewalls and Internet Security, William Cheswick and Steven Bellovin, Addison-Wesley, 1994.12.7 Firewalls 12.9 Summary [ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]

Wyszukiwarka

Podobne podstrony:
ch12
ch12 (15)
ch12 (16)
ch12
ch12
ch12
ch12
ch12
ch12
ch12
ch12
ch12
ch12
ch12
budynas SM ch12
ch12
CH12
ch12 (3)

więcej podobnych podstron