O'Reilly logo

Eleventh Hour Linux+ by Terrence V. Lillard, Chris Happel, Brian Barber, Graham Speake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 9. Securing Linux
Exam objectives in this chapter
■ Managing and Monitoring User and Group Accounts
■ File Permissions and Ownership
■ SELinux Basics
■ Implementing Privilege Escalation
■ Security Applications and Utilities
■ Checksum and File Verification Utilities
■ Implementing Remote Access
■ Authentication Methods

Introduction

Linux is regarded as a secure operating system; however, even the most secure systems can have an occasional flaw or be misconfigured, and security is best applied in layers. In this chapter, we'll look at the tasks necessary to make sure your Linux systems live up to their secure reputation.

Managing and Monitoring User and Group Accounts

It's critical to be able to control who gets access to what information to maintain ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required