15
Security Guidelines and Best Practices
In the modern world, where almost all computers are connected to the internet and online applications play an increasingly larger role in all aspects of our lives, information security is also becoming more and more important. When information stored in digital form becomes more valuable and malicious actors constantly devise new attacks, every system administrator must make a conscious effort to keep their machines secure.
Luckily, following security guidelines and best practices can prevent most attacks and limit the impact of successful attacks if they occur.
In this chapter, we will learn about the following:
- Information security components and types of breaches
- Common types of attacks and threats ...
Get Linux for System Administrators now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.