Security attacks on computer infrastructures are becoming an increasingly serious problem and, among others, the Solaris operating system has become a regular target. In this chapter, we'll examine different types of attacks and discuss ways to alleviate some of the most common forms while mitigating ensuing risks. Specifically, this chapter deals with distinguishing between several common types of Denial of Service (DoS) attacks, understanding how and why DoS attacks are executed, and establishing courses of action to help prevent DoS attacks. All of these topics are covered on the exam.
In this chapter, when we edit a system file, we'll be using the operating system's visual editor (vi). (For more information on vi, see Chapter 4.)