One of the most important, and most frequently overlooked, aspects of Linux security is securing the system itself. I’ll address the following topics here:
• Securing the physical environment
• Securing access to the operating system
Let’s begin by discussing how to secure the physical environment.
As a consultant, I work with a variety of different clients. In any given week, I may visit three or four different organizations to help them with their network or to help them develop training materials for computing products (such as this book). In this capacity, I’ve had the opportunity to observe a wide range of system implementations. One of the most common mistakes I see over and over is the ...