13.7. Summary

In this chapter you saw how to go about locking down your Unix (or Unix-based system, such as Linux and FreeBSD) system. We discussed file permissions and how they can be tuned to restrict access to sensitive files. We also looked at how the Unix system deals with authentication and why it is so important to lock down the root user account. Finally, we looked at IP services and how you can limit which hosts have access to them.

The next chapter will look at some common exploits, describing how each vulnerability is exploited and what you can do to protect your network.

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.