Summary

Corporate networks and data centers have to contend with the threat of attacks on networks, theft of data, and damage to critical services and applications on a 24×7 basis. Although you can secure a network by using advanced security mechanisms and products, measures to overcome such security problems are also available as free and/or open source software.

The challenge for the system administrator is to always keep a step ahead of the attempts to compromise system and network security and the integrity of stored data. In this chapter, you learned how to implement various security protocols and mechanisms to secure Solaris 9 systems.

Get Special Edition Using® Solaris™ 9 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.