Security Models
There are several models of security that you can adopt for your system; depending on your circumstances, any of these models might apply to you. The model you choose will dictate how careful you will need to be about certain administrative duties, such as password policies, open services, encrypted traffic, and so on.
“I trust everybody on the Internet.” Most certainly an inadvisable model, this is nonetheless how a lot of amateur servers are run, and they pay the price for it. Often found on university systems, especially those that have been around for many years (since before the Internet became so rich in hacker activity), these types of systems have many open services, don't require encrypted logins, have a loose account ...
Get FreeBSD® Unleashed now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.