Solved

Linux Security

Posted on 2006-06-08
1
219 Views
Last Modified: 2010-04-11
Hello I went to a job interview in which the knowledge on linux security had to be vast. However, I was not disclosed detailed information on the solution in place, however I was told that Linux was used as the front line of defense and had a firewall installed on it which is open source according to the manager. I was wondering if you experts were familiar on those types of open source programs/solutions for linux.

I was also wondering where does that leave CISCO firewalls compared to the linux-only solution. In addition, the interviewer also told me that he taught CISCO in a technical shool for many years and that has left me wondering since he told me that there are Linux Security certifications that cost more than $3,000 US and that very very few people had those certs since they were so hard and costly.

Can somebody please enlighten me on this secret world of Linux Security. Thanks.

0
Comment
Question by:elyrodriguez
1 Comment
 
LVL 9

Accepted Solution

by:
gtkfreak earned 125 total points
ID: 16868243
All details on Linux Security can be found out on the internet. Linux uses a firewall in-built called iptables. You also have other firewalls like firestarter. These are open-source solutions for Linux. Configuration of rules and tuning instructions are available with them. You can also refer to HOWTOs published by the Linux communities on the internet. Many setups use old computers and dedicate them as firewall products. You also have proxy servers such as Squid and other software like spamassassin, netfilter, clamav (antivirus), snort intrusion detection system, network analyzers such as ethereal, vulnerability scanners such as nessus. To get to know more about these, you can install Linux on your computer and experiment on them. You can start with http://www.tldp.org and look for the HOWTO on Linux Security and further references.

AFAIK, the certification courses of RedHat i.e. RHCE are most popular. You can get more details on the Red Hat site on them.

0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The related questions "How do I recover the passwords for my Q-See DVR" and "How can I reset my Q-See DVR to eliminate a password" are seen several times a week.  Here we discuss the grim reality of the situation.
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question