CHAPTER 9. Securing Linux
Exam objectives in this chapter
■ Managing and Monitoring User and Group Accounts
■ File Permissions and Ownership
■ Implementing Privilege Escalation
■ Security Applications and Utilities
■ Checksum and File Verification Utilities
■ Implementing Remote Access
Linux is regarded as a secure operating system; however, even the most secure systems can have an occasional flaw or be misconfigured, and security is best applied in layers. In this chapter, we'll look at the tasks necessary to make sure your Linux systems live up to their secure reputation.
Managing and Monitoring User and Group Accounts
It's critical to be able to control who gets access to what information to maintain ...
Get Eleventh Hour Linux+ now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.