Chapter 3. Basic Security: Facilities Through the Boot Process

BASIC ELEMENTS OF COMPUTER SECURITY begin in the server room. What you do there defines the additional steps required to secure servers, workstations, and more. Security is enhanced with developments in Trusted Computing Modules on motherboards. Such modules are compatible with open source principles. Physical security issues take another dimension on virtual machines.

Security issues continue with the boot process, as a black-hat hacker can use poorly configured boot systems and boot loaders to gain administrative access to your systems. Security issues continue with the kernel, as the developers behind Linux distributions include settings for a wide audience. Obscurity can help, as ...

Get Security Strategies in Linux Platforms and Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.