Chapter 24. Securing Mac OS X

IN THIS CHAPTER

  • Introducing Unix security

  • Understanding vulnerabilities

  • Understanding physical security

  • Understanding network security

  • Enabling services

  • Using the built-in firewall

  • Understanding the need for port blocking

  • Protecting yourself from system bugs

  • Familiarizing yourself with system logs

This chapter provides an overview of Mac OX security, common types of threats and vulnerabilities, and the tools built into Mac OS X and third-party software to help safeguard your data.

Introduction to Unix Security

When considering computer security, it's most important to understand that there is a trade-off between ease of use and flexibility versus safety and security. The more secure a system is, the more complex it becomes. Think of system security in the context of an automobile. You could leave the doors unlocked and keep the key in the ignition. Then you wouldn't ever need to search for the keys to open the doors, and with the keys handily stored in the ignition, you wouldn't ever have to fumble to insert them. As far as ease of use, it couldn't get simpler. However, under those conditions in the great metropolis known as the Internet you'd be lucky to find your car where you left it; eventually someone else would just open the door, turn the key, and carjack—or in this case, Macjack— your vehicle. The same thing goes for a computer. If you are the only user, it's easy to assume that nobody would want anything you've got and just leave the "doors" wide open. ...

Get Mac OS® X Leopard™ Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.