Introduction

Until this point in your studies, you've learned a number of valuable computer security principles that apply equally to any computing environment. You've explored the principles of network security, policy design, perimeter protection, and intrusion analysis, among others. In this chapter, you begin looking at the practical applications of these theories to the two most common operating systems in use today. We begin by examining operating system security issues that apply to all operating systems and then examine unique concerns for environments utilizing the Microsoft Windows family of operating systems as well as the various flavors of the Unix operating system available in today's marketplace.

As you review this material, keep ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.