General Operating System Security

Although every operating system is different, there are a number of fundamental security practices that apply to all systems, regardless of vendor. In this section, we examine some of the “best practices” that transcend vendor constraints and benefit all system administrators.

Patches, Service Packs, and Hot Fixes

If you take a few moments to browse through the security bulletins published by operating system manufacturers and computer security organizations, you find that there are hundreds of known vulnerabilities for almost every operating system in existence today.

Unfortunately, these bulletins are available to “white hats” (security professionals) and “black hats” (malicious hackers) alike. Vendors and ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.