Securing Linux, Part 2: Planning the installation
Only the paranoid survive, and that is no less true when securing Linux systems as any other. Fortunately, a host of security features are built into the kernel, are packaged with one of the many Linux distributions, or are available separately as open source applications. This second installment covers inventory assessment, risk analysis, identifying user categories and access privileges, and then moves on to a more detailed action plan and steps for safely acquiring a Linux distribution.
|
|
Only the paranoid survive, and that is no less true when securing Linux systems as any other. Fortunately, a host of security features are built into the kernel, are packaged with one of the many Linux distributions, or are available separately as open source applications. This second installment covers inventory assessment, risk analysis, identifying user categories and access privileges, and then moves on to a more detailed action plan and steps for safely acquiring a Linux distribution. Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.