A vast array of threats is posed to our computer systems today, everything from simple file permissions to password security to social engineering and computer viruses. In this chapter, we look at some of the immediate threats to our computer systems and the valuable data held within them. Here's a brief list of the topics we discuss:
User-level security settings
HP-UX Trusted Systems
/etc/default/security configuration file
Common security administration tasks
Common first-level security concerns
In addition, we ...