This part of the book provides a basic introduction to UNIX
host security. These chapters are intended to be accessible to both
users and system administrators.
-
Chapter 3,
Users and Passwords
, is
about UNIX user accounts. It discusses the purpose of passwords,
explains what makes good and bad passwords, and describes how the
crypt
() password encryption
system works.
-
Chapter 4,
Users, Groups, and the Superuser
, describes how
UNIX groups can be used to control access to files and devices.
It also discusses the UNIX superuser and the role that special users
play.
-
Chapter 5,
The UNIX Filesystem
, discusses the security provisions
of the UNIX filesystem and tells how to restrict access to files
and directories to the file's owner, to a group of people,
or to everybody on the computer system.
-
Chapter 6,
Cryptography
, discusses the role of encryption
and message digests in your security. It includes a discussion of
how various popular encryption schemes, including the PGP mail package,
work.
|
|