Skip to Main Content
IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition
book

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

by Chris Davis, Mike Schiller, Kevin Wheeler
February 2011
Intermediate to advanced content levelIntermediate to advanced
512 pages
15h 37m
English
McGraw-Hill
Content preview from IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

CHAPTER 7Auditing Unix and Linux Operating Systems

This chapter discusses the steps required for auditing Unix- and Linux-based operating systems (also referred to as *nix systems) and includes the following:

• The history of Unix and Linux

• Basic commands for getting around in the *nix environment

• How to audit Unix and Linux systems, focusing on the following main areas:

• Account management and password controls

• File security and controls

• Network security and controls

• Audit logs

• Security monitoring and general controls

• Tools and resources for enhancing your *nix audits

Background

Unix dates back to 1969, when it was developed by employees at AT&T for the purpose of providing an environment in which multiple users could run programs. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Legal and Privacy Issues in Information Security, 3rd Edition

Legal and Privacy Issues in Information Security, 3rd Edition

Joanna Lyn Grama
Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9780071742382