Chapter TWENTY NINE. Dealing with Immediate Security Threats
A vast array of threats is posed to our computer systems today, everything from simple file permissions to password security to social engineering and computer viruses. In this chapter, we look at some of the immediate threats to our computer systems and the valuable data held within them. Here's a brief list of the topics we discuss:
User-level security settings
HP-UX Trusted Systems
Common security administration tasks
Common first-level security concerns
In addition, we ...