commit 579ad2b249adcdf901c03204169d277edca94217
parent 472942bf12295ae41e794dd27ca0fc0f19624e55
Author: mayfrost <mayfrost@cock.li>
Date: Sat, 14 Apr 2018 00:23:03 -0300
Update SECURITY.md
Diffstat:
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/SECURITY.md b/SECURITY.md
@@ -51,9 +51,9 @@ Not necessarily meant to be followed step by step, although it is recommended. S
* __Level 35__: Use a command line browser like links2 to browse web pages.
* __Level 36__: Use Bastille Linux to harden your system.
* __Level 37__: Use Lynis to audit your system.
-* __Level 38__: Use Arpalert/ArpON (for Man-In-The-Middle -MITM- Detection) and Suricata/Snort (for Network Intrusion Detection).
+* __Level 38__: Use Arpalert/ArpON (for Man-In-The-Middle -MITM- Detection), [zapret](https://github.com/bol-van/zapret) (for Deep Packet Inspection -DPI- Block and Circumvention), and Suricata/Snort (for Network Intrusion Detection).
* __Level 39__: Use a complete host intrusion detection framework like Tiger, which can work with Samhain (for integrity check), Unhide/Chkrootkit/rkhunter (for rootkit detection), ClamAV/Linux Malware Detect and a system logger like sysklogd.
-* __Level 40__: Use RSBAC (for RBAC) with AppArmor (for filesystem ACL).
+* __Level 40__: Use [RSBAC](https://www.rsbac.org/) (for RBAC) with AppArmor (for filesystem ACL).
* __Level 41__: Compile the kernel yourself and add only necessary features and selected modules. Enable KASLR and Capabilities on kernel configuration.
### Start of deterrent measures