home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 2.5 The Problem with Security  Through Obscurity Part II Next: 3. Users and Passwords
 

Part II: User Responsibilities

This part of the book provides a basic introduction to UNIX host security. These chapters are intended to be accessible to both users and system administrators.

  • Chapter 3, Users and Passwords , is about UNIX user accounts. It discusses the purpose of passwords, explains what makes good and bad passwords, and describes how the crypt () password encryption system works.

  • Chapter 4, Users, Groups, and the Superuser , describes how UNIX groups can be used to control access to files and devices. It also discusses the UNIX superuser and the role that special users play.

  • Chapter 5, The UNIX Filesystem , discusses the security provisions of the UNIX filesystem and tells how to restrict access to files and directories to the file's owner, to a group of people, or to everybody on the computer system.

  • Chapter 6, Cryptography , discusses the role of encryption and message digests in your security. It includes a discussion of how various popular encryption schemes, including the PGP mail package, work.


Previous: 2.5 The Problem with Security  Through Obscurity Practical UNIX & Internet Security Next: 3. Users and Passwords
2.5 The Problem with Security Through Obscurity Book Index 3. Users and Passwords