Unix Security Basics

The Unix operating system comes in a number of variations—Solaris/SunOS, HP-UX, SCO, and Linux (which has its own variants!) are just a few. The vendors that created these operating systems strove to implement a core set of services in a manner that ran efficiently on their hardware platform. To the end user, differences between these operating systems are largely cosmetic. Security administrators, on the other hand, must be intimately familiar with the security holes inherent in each. This section covers Unix security principles that apply to all variants. In the field, however, it's critical that you investigate the specific patches and vulnerabilities that apply to your particular flavor of Unix.

Users and Groups

Unix ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.