< Previous | Contents | Next >
Securing and Monitoring Kali Linux
Chapter
7
Contents
Defining a Security Policy 150 Possible Security Measures 152 Securing Network Services 153
Firewall or Packet Filtering 153 Monitoring and Logging 161 Summary 164
As you begin to use Kali Linux for increasingly sensitive and higher-profile work, you will likely need to take the security of your installation more seriously. In this chapter, we will first discuss security policies, highlighting various points to consider when defining such a policy, and outlin- ing some of the threats to your system and to you as a security professional. We will also discuss security measures for laptop and desktop systems and focus on firewalls and packet filtering. Fi- nally, we will discuss monitoring tools and strategies and show you how to best implement them to detect potential threats to your system.