Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Linux Security

Posted on 2006-06-08
1
Medium Priority
?
235 Views
Last Modified: 2010-04-11
Hello I went to a job interview in which the knowledge on linux security had to be vast. However, I was not disclosed detailed information on the solution in place, however I was told that Linux was used as the front line of defense and had a firewall installed on it which is open source according to the manager. I was wondering if you experts were familiar on those types of open source programs/solutions for linux.

I was also wondering where does that leave CISCO firewalls compared to the linux-only solution. In addition, the interviewer also told me that he taught CISCO in a technical shool for many years and that has left me wondering since he told me that there are Linux Security certifications that cost more than $3,000 US and that very very few people had those certs since they were so hard and costly.

Can somebody please enlighten me on this secret world of Linux Security. Thanks.

0
Comment
Question by:elyrodriguez
1 Comment
 
LVL 9

Accepted Solution

by:
gtkfreak earned 375 total points
ID: 16868243
All details on Linux Security can be found out on the internet. Linux uses a firewall in-built called iptables. You also have other firewalls like firestarter. These are open-source solutions for Linux. Configuration of rules and tuning instructions are available with them. You can also refer to HOWTOs published by the Linux communities on the internet. Many setups use old computers and dedicate them as firewall products. You also have proxy servers such as Squid and other software like spamassassin, netfilter, clamav (antivirus), snort intrusion detection system, network analyzers such as ethereal, vulnerability scanners such as nessus. To get to know more about these, you can install Linux on your computer and experiment on them. You can start with http://www.tldp.org and look for the HOWTO on Linux Security and further references.

AFAIK, the certification courses of RedHat i.e. RHCE are most popular. You can get more details on the Red Hat site on them.

0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question