next up previous contents
Next: 2. The SysHackAdminer Up: 1. Introduction Previous: 1. Introduction

1.1 Document Layout

The document is arranged into four logical parts:

The security problems and solutions sections each consist of three chapters. The chapters are further broken down into a host security issues chapter, a network security issues chapter and a final case studies chapter. The host and network security issues chapters are further broke down into theoretical and practical sections. The case studies chapters illustrate how the problems and solutions get applied in practice.

Chapter 2 introduces us to the traditional hacker and the traditional systems administrator. A discussion follows on the change that the systems administrator needs to undergo. The composite person is named a SysHackAdminer followed by a discussion of what he ``inherits'' from both ``parents''.

Chapter 3 is the beginning of the technical part of the document. It is also the first chapter to deal with security problems. Host security problems are discussed with illustrations of how they may be exploited.

Chapter 4 discusses network security problems. Here too the problems discussed are followed with illustrations of how they may be exploited.

Chapter 5 provides case studies for the two previous chapters. It serves as an illustration of how the different security problems can be exploited in real break-ins and how to use previous exploits to climb the ``ladder of privilege''.

Chapter 6 is the beginning of the solutions section of the document. Host security solutions to the problems discussed in chapter three are proposed and some applied.

Chapter 7 discusses network security solutions. The chapter also introduces us to a security mechanism that promises to improve the dismal state of network security.

Chapter 8 provides case studies for the previous two chapters. In this chapter, firewalls are charged with the responsibility of performing commonly required security tasks. This chapter is also used to point out how firewalls cope also with implementing the security solutions proposed in the previous two chapters.

Chapter 9 concludes our discussions and ties all the chapters together.


next up previous contents
Next: 2. The SysHackAdminer Up: 1. Introduction Previous: 1. Introduction
Shaun Bangay
1998-11-19