Chapter 13. Implementing System Security
You will learn about the following in this chapter:
Controlling access with authentication, authorization, and accounting
The different types of security
The concept of least privilege
Why you should separate services
How to manage the root account
How to delegate authority
Exploits and attacks
Encryption
Alternative authentication methods
Simple ways to improve your systems' security
Forums for the discussion of security issues
Unix was not originally designed with security in mind; but as time passed, operating system vendors and third-party developers realized the importance of system security and began to integrate security features into applications and operating systems. As the Internet enabled more and more ...
Get Unix® System Management Primer Plus now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.