summaryrefslogtreecommitdiff
path: root/src/admin/6_security.xml
diff options
context:
space:
mode:
authorA. Wilcox <AWilcox@Wilcox-Tech.com>2018-12-15 23:02:24 -0600
committerA. Wilcox <AWilcox@Wilcox-Tech.com>2018-12-15 23:02:24 -0600
commit51fea5910a1d0837ebab48d2f32edb79d35b5849 (patch)
tree217ec5b620fae1b7b6b924f7e9c5d7d14a6bc6ed /src/admin/6_security.xml
parente77801f236925a24b1974016a36a9033ecd84e33 (diff)
downloaddocs-51fea5910a1d0837ebab48d2f32edb79d35b5849.tar.gz
docs-51fea5910a1d0837ebab48d2f32edb79d35b5849.tar.bz2
docs-51fea5910a1d0837ebab48d2f32edb79d35b5849.tar.xz
docs-51fea5910a1d0837ebab48d2f32edb79d35b5849.zip
Admin: Give every section a readable, user-friendly ID
Diffstat (limited to 'src/admin/6_security.xml')
-rw-r--r--src/admin/6_security.xml8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/admin/6_security.xml b/src/admin/6_security.xml
index 18c16bd..f0226ee 100644
--- a/src/admin/6_security.xml
+++ b/src/admin/6_security.xml
@@ -2,12 +2,12 @@
<chapter label="6" id="security">
<title>Security</title>
<highlights><para>In this chapter, we will review best practices for keeping your Adélie Linux systems secure.</para></highlights>
- <section>
+ <section id="introduction6">
<title>Introduction to computer security</title>
- <para>No one book can teach you everything about computer security. Computer security is not simply an item on a list that must be done once and then it is "completed". Computers are very powerful tools, and just as they can be used to teach, create, and produce, they can also be used for more nefarious purposes. By taking a proactive approach to computer security, and treating it as a process, you will be much more successful in keeping the security, confidentiality, and integrity of your data intact.</para>
+ <para>No one book can teach you everything about computer security. Computer security is not simply an item on a list that must be done once and then it is "completed". Computers are very powerful tools, and just as they can be used to teach, create, and produce, they can also be used for more nefarious purposes. By taking a proactive approach to computer security, and treating it as a process, you will be much more successful in keeping the security, confidentiality, and integrity of your data intact. You first need to identify your <firstterm>threat model</firstterm>; that is, what advisaries are you attempting to keep out? A sophisticated nation-state requires a much different security plan than a random hacker.</para>
<para>The suggestions in this handbook are a starting point to help you develop an actionable plan to keep your computer secure. They are by no means exhaustive. Remember to always keep learning; knowledge is power.</para>
</section>
- <section>
+ <section id="apk_sec">
<title>APK</title>
<itemizedlist>
<listitem><para>Only use repositories and mirrors with HTTPS.</para></listitem>
@@ -15,7 +15,7 @@
<listitem><para>Ensure any custom or third-party repositories have high-grade signature keys and that you trust the developers.</para></listitem>
</itemizedlist>
</section>
- <section>
+ <section id="service_sec">
<title>Services</title>
<itemizedlist>
<listitem><para>If a service is only being used in your internal network, make sure it is configured to only accept connections from that network. This reduces the chance that an external attacker from the Internet can connect to it.</para></listitem>