Part II. Security Building Blocks
This part of the book provides a basic introduction to Unix host security. The chapters in this part are designed to be accessible to both users and administrators.
Chapter 4, is about Unix user accounts. It discusses the purpose of passwords, explains what makes good and bad passwords, and describes how the crypt( ) password encryption system works.
Chapter 5, describes how Unix groups can be used to control access to files and devices. It also discusses the Unix superuser and the role that special users play. This chapter also introduces the Pluggable Authentication Module (PAM) system.
Chapter 6, discusses the security provisions of the Unix filesystem and tells how to restrict access to files and directories to the file’s owner, to a group of people, or to everybody using the computer system.
Chapter 7, discusses the role of encryption and message digests in protecting your security.
Chapter 8. What if somebody gets frustrated by your super-secure system and decides to smash your computer with a sledgehammer? This chapter describes physical perils that face your computer and its data and discusses ways of protecting against them.
Chapter 9, explores who you employ and how they fit into your overall security scheme.
Get Practical UNIX and Internet Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.