O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Unix Security Basics

The Unix operating system comes in a number of variations—Solaris/SunOS, HP-UX, SCO, and Linux (which has its own variants!) are just a few. The vendors that created these operating systems strove to implement a core set of services in a manner that ran efficiently on their hardware platform. To the end user, differences between these operating systems are largely cosmetic. Security administrators, on the other hand, must be intimately familiar with the security holes inherent in each. This section covers Unix security principles that apply to all variants. In the field, however, it's critical that you investigate the specific patches and vulnerabilities that apply to your particular flavor of Unix.

Users and Groups

Unix ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required