6
Encryption Technologies
You may work for a super-secret government agency, or you may be just a regular Joe or Jane citizen. Either way, you still have sensitive data that you need to protect from prying eyes. Business secrets, government secrets, personal secrets—it doesn’t matter. It all needs protection. Locking down users’ home directories with restrictive permissions settings, as we saw in Chapter 3, Securing Normal User Accounts, is only part of the puzzle; we also need encryption. This encryption will provide three things for us:
- Confidentiality: This ensures that only people who are authorized to see the data can see it.
- Integrity: This ensures that the original data haven’t been altered by unauthorized people.
- Availability: This ...
Get Mastering Linux Security and Hardening - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.