UNIX Security

Mark Shacklette, The University of Chicago

What Is Security?

Physical Versus Data Versus Privacy

Loss Versus Stealth

Importance of a Security Policy

Cost-Benefit Analysis

Audits

Personnel Checks

Open Source Versus Private Vendor Issues

Keeping Up with Patches and Releases

UNIX Security

Login Security

File Systems Protection

Data Security

Encryption

Passwords

Smart Cards

Access Control Lists

Role-Based Access Control

Network Security and Firewalls

Software Security

Security Strategies

Conclusion

Glossary

Cross References

References

Further Reading

WHAT IS SECURITY?

The topic of security in general, and of UNIX security in particular, is a vast subject. The word security comes from the Latin securitas, which literally means “without care.” Thus, being secure, at least according to the Romans, meant feeling “safe,” without a care in the world. The irony is that most people, when it comes to computers, take this approach toward security initially—they feel secure, even though, in fact, it is a false sense at heart. Computer crime is a growing business, and the threat of cyberterrorism is growing at an alarming rate. Every year for the past eight years, the Computer Security Institute and the Federal Bureau of Investigation have produced a report detailing the losses incurred by a number of industries, which includes input from 530 respondents representing sectors as diverse as government, retail, medical, high-tech, transportation, telecom, financial, and manufacturing, ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.