O'Reilly logo

IT Auditing: Using Controls to Protect Information Assets by Kevin Wheeler, Mike Schiller, Chris Davis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7Auditing Unix and Linux Operating Systems

This chapter discusses the steps required for auditing Unix- and Linux-based operating systems (also referred to as *nix systems) and includes the following:

• The history of Unix and Linux

• Basic commands for getting around in the *nix environment

• How to audit Unix and Linux systems, focusing on the following main areas:

• Account management and password controls

• File security and controls

• Network security and controls

• Audit logs

• Security monitoring and general controls

• Tools and resources for enhancing your *nix audits

Background

Unix dates back to 1969, when it was developed by employees at AT&T for the purpose of providing an environment in which multiple users could run programs. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required