Skip to Content
Security Strategies in Linux Platforms and Applications, 3rd Edition
book

Security Strategies in Linux Platforms and Applications, 3rd Edition

by Ric Messier, Michael Jang
October 2022
Intermediate to advanced
500 pages
19h 57m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 3rd Edition

Monitoring Account Behavior for Security Issues

On a corporate network, you may need to look for signs of inappropriate behavior in user home directories. If a user has downloaded source code on his or her system, that user may have already compiled that code into a binary program of some sort. In that case, there will be files somewhere in the tree of the user’s home directory with executable privileges. Of course, such checks are subject to organizational policies. In general, it’s best if users know about such checks before they are performed so they are aware of the expectations with respect to their behavior. Note, too, that such checks may not be reasonable if users are in fact Linux developers or testers.

Downloaded Packages and Source ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition

Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition

Sander van Vugt
Theoretical Cybersecurity: Principles and Advanced Concepts

Theoretical Cybersecurity: Principles and Advanced Concepts

Jacob G. Oakley, Michael Butler, Wayne York, Matthew Puckett, J. Louis Sewell
Three Essentials for Agentic AI Security

Three Essentials for Agentic AI Security

Paolo Dal Cin, Daniel Kendzior, Yusof Seedat, Renato Marinho

Publisher Resources

ISBN: 9781284255881