Chapter 13. Implementing System Security

You will learn about the following in this chapter:

  • Controlling access with authentication, authorization, and accounting

  • The different types of security

  • The concept of least privilege

  • Why you should separate services

  • How to manage the root account

  • How to delegate authority

  • Exploits and attacks

  • Encryption

  • Alternative authentication methods

  • Simple ways to improve your systems' security

  • Forums for the discussion of security issues

Unix was not originally designed with security in mind; but as time passed, operating system vendors and third-party developers realized the importance of system security and began to integrate security features into applications and operating systems. As the Internet enabled more and more ...

Get Unix® System Management Primer Plus now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.