Table of Contents
This chapter addresses basic user security after the operating system is installed. It focuses on logins, passwords, and other user interactions with the system. The following topics are discussed:
Managing user access (Section )
Authenticating users during login (Section )
Authenticating users with PAM (Section )
Managing passwords (Section )
Defining system security attributes (Section )
Handling setuid and setgid programs (Section )
Preventing stack buffer overflow attacks (Section )
Protecting unattended terminals and workstations (Section )
Protecting against system access by remote devices (Section )
Securing login banners (Section )
Protecting the root account (Section )