From the course: Linux Hardening
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Hardening storage devices - Linux Tutorial
From the course: Linux Hardening
Hardening storage devices
Hello, and welcome to Cybrary's Linux Hardening course. This lesson is the hardening of the storage devices. I am your instructor, Corey Holzer. The objectives for this lesson are threefold. First, I want you to have knowledge. You need to articulate the goal of encryption as a means for protecting data at rest. At the end of this lesson, you will be able to articulate the role of the Access Control Lists. Lastly, you'll be able to define the concept of world-writable files and explain to someone why they are so dangerous. Since protecting data at rest is the purpose behind securing storage devices, let's define data at rest. Simply put, data at rest is a term given to files and data contained on a storage device, while those files are not currently in use. Therefore, files open in editors or files being transmitted as attachments or downloads are considered data in transit and do not qualify as data at rest. There are three options for encryption. We can encrypt individual files…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Why we harden3m 52s
-
(Locked)
Hardening-in-depth as a concept5m 27s
-
(Locked)
The CIS benchmarks1m 41s
-
(Locked)
Hardening the foundation2m 23s
-
(Locked)
Hardening storage devices4m 44s
-
(Locked)
Firewalls and IPS/IDS as endpoint security4m 35s
-
(Locked)
Managing services5m 17s
-
(Locked)
Lifecycle management4m 7s
-
(Locked)
Recommendations for integrating hardening measures4m 56s
-
-
-
-
-