OnWorks Linux and Windows Online WorkStations

Logo

Free Hosting Online for WorkStations

< Previous | Contents | Next >

Securing and Monitoring Kali Linux‌

Chapter

image

image

7


Contents


image


Defining a Security Policy 150 Possible Security Measures 152 Securing Network Services 153

Firewall or Packet Filtering 153 Monitoring and Logging 161 Summary 164


image

As you begin to use Kali Linux for increasingly sensitive and higher-profile work, you will likely need to take the security of your installation more seriously. In this chapter, we will first discuss security policies, highlighting various points to consider when defining such a policy, and outlin- ing some of the threats to your system and to you as a security professional. We will also discuss security measures for laptop and desktop systems and focus on firewalls and packet filtering. Fi- nally, we will discuss monitoring tools and strategies and show you how to best implement them to detect potential threats to your system.‌


 

Top OS Cloud Computing at OnWorks: