Introduction to Intrusion Protection and Network Security

Jennifer Vesperman

jenn@linuxchix.org

Megan Golding

meggolding@yahoo.com

2002-02-24

Revision History
Revision 0.12002-02-17Revised by: MEG
Converted from text file. Modified wording.
Revision 0.22002-02-23Revised by: MEG
Incorporated Jenn's suggestions.
Revision 0.32002-02-24Revised by: MEG
Conforming to LDP standards. Added abstract.

Table of Contents
1. Introduction
1.1. Copyright Information
1.2. Overview
2. The Locked Front Door
3. Passwords
4. Permissions
5. Firewalls
6. Other security measures
6.1. Unused programs
6.2. Bugs & patches
6.3. Monitoring
6.4. What do I do if I think I've been broken into?
6.5. Final words
7. Links and further information