Security Hardening of a Linux-Based Product

  • 13m
  • Aditya Lad
  • EMC
  • 2013

Securing Linux is not an easy job. Even though securing software is a never ending task and in fact true security does not exist, it is an important requirement of today’s software development. Good security practices never go unnoticed. This article discusses the various points which must be considered while strengthening the security of a Linux-based product. The article’s primary focus is to suggest means on how to approach your product’s security and execute it. The attention on the technical details and nitty-gritty is minimal, as a lot of good sources are already available online. The content is based on practical experiences accrued over a period of time.

In this Book

  • Security Hardening Of A Linux-Based Product
  • Abstract
  • Introduction
  • Gather Your Resources
  • Threat Modeling
  • Prioritizing Product Areas for Security
  • Help from Vulnerability scanners
  • Security Testing
  • Importance of security training
  • Summary

YOU MIGHT ALSO LIKE

Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)
Rating 4.8 of 14 users Rating 4.8 of 14 users (14)
Journey OS Exploits