CHAPTER 9. Securing Linux
Exam objectives in this chapter
■ Managing and Monitoring User and Group Accounts
■ File Permissions and Ownership
■ SELinux Basics
■ Implementing Privilege Escalation
■ Security Applications and Utilities
■ Checksum and File Verification Utilities
■ Implementing Remote Access
■ Authentication Methods

Introduction

Linux is regarded as a secure operating system; however, even the most secure systems can have an occasional flaw or be misconfigured, and security is best applied in layers. In this chapter, we'll look at the tasks necessary to make sure your Linux systems live up to their secure reputation.

Managing and Monitoring User and Group Accounts

It's critical to be able to control who gets access to what information to maintain ...

Get Eleventh Hour Linux+ now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.