Book Image

Linux for System Administrators

By : Viorel Rudareanu, Daniil Baturin
Book Image

Linux for System Administrators

By: Viorel Rudareanu, Daniil Baturin

Overview of this book

Linux system administration is an essential aspect of maintaining and managing Linux servers within an organization. The role of a Linux system administrator is pivotal in ensuring the smooth functioning and security of these servers, making it a critical job function for any company that relies on Linux infrastructure. This book is a comprehensive guide designed to help you build a solid foundation in Linux system administration. It takes you from the fundamentals of Linux to more advanced topics, encompassing key areas such as Linux system installation, managing user accounts and filesystems, networking fundamentals, and Linux security techniques. Additionally, the book delves into the automation of applications and infrastructure using Chef, enabling you to streamline and optimize your operations. For both newcomers getting started with Linux and professionals looking to enhance their skills, this book is an invaluable hands-on guide with a structured approach and concise explanations that make it an effective resource for quickly acquiring and reinforcing Linux system administration skills. With the help of this Linux book, you’ll be able to navigate the world of Linux administration confidently to meet the demands of your role.
Table of Contents (21 chapters)
1
Part 1: Linux Basics
7
Part 2: Configuring and Modifying Linux Systems
13
Part 3: Linux as a Part of a Larger System

Common threats and attack types

There are many reasons why attackers may target a system, many ways to attack targets, and multiple possible consequences for the operator of the compromised system. Let’s examine them in detail.

The motivation of attackers and the possible consequences

The picture of an attack on computer systems that movies, literature, and video games tend to show is usually an attack on a carefully selected target with a specific goal – most often, to steal some valuable information, modify it, or perhaps destroy it.

Such attacks certainly exist in the real world and they are a huge concern for high-profile companies and government agencies. However, that popular depiction often misleads people into believing that security is not important for them because they do not have any valuable information and are not high-profile targets.

That perception might have been correct in the early days of the internet but, these days, it is a very dangerous...