07.06.2014 Views

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter<br />

Security14<br />

Contents<br />

Defining a Security Policy 374 Firewall or Packet Filtering 375<br />

Supervision: Prevention, Detection, Deterrence 382 Introduction to SELinux 388<br />

Other Security-Related Considerations 400 Dealing with a Compromised Machine 404<br />

An information system can have a varying level of importance depending on the environment.<br />

In some cases, it is vital to a company's survival. It must therefore be<br />

protected from various kinds of risks. The process of evaluating these risks, defining<br />

and implementing the protection is collectively known as the “security process”.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!