As Linux users we have some
inherent advantages over our
fellow Windows users when it comes to security (or lack there of).
Hackers,
rather like gamblers, use the laws of odds and averages in their
endeavors to
find vulnerable computer systems to break into. They will typically
target the
types of systems that have the most security vulnerabilities. They will
also
mostly focus attention on areas where there are the most opportunities
for
unprotected systems – in other words the types are system that are most
common
on the internet. In both these cases Windows is the predominant
operating system.
In security circles they say Windows has a larger “surface area” to
attack both
in terms of vulnerabilities and numbers of systems.
Linux is both more secure and
less common than Windows based
systems with the consequence that attacks on Linux systems occur less
frequently than on Windows systems. Having said that it would be
foolish to be
complacent about securing any system regardless of whether it runs
Windows,
Linux or any other operating system.
The purpose of this book is to provide a
step by step
approach to securing a Linux system from outside attack. It is designed
to be
used and understood by both new and experienced Linux users.