O'Reilly logo

Security Strategies in Linux Platforms and Applications by Michael Jang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Filesystems, Volumes, and Encryption

AS A LINUX EXPERT, you already know how to set up partitions, logical volumes, and redundant array of independent disks (RAID) systems. You know how to configure those systems on selected directories. You know how to format those filesystems. But there are choices that can enhance security or at least limit the risk to important data. These choices relate to how such volumes are organized, how they're mounted, and how they're formatted. Of course, encryption of such filesystems can also enhance security.

While file and folder permissions are basic to Linux, they are the starting point for security on Linux. You'll examine those permissions when they're local and when they're mounted from remote systems. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required