Solved

Unix security & security manual

Posted on 1998-09-19
2
256 Views
Last Modified: 2010-04-21
NEED INFORMATION ON :

A: UNIX SECURITY
B: UNIX SECURITY PROCEDURES & POLICIES
C: STEPS TO PREPARE THESE MANUALS
D: STEPS TAKEN FOR THIS PROCEDURES

THANK YOU
0
Comment
Question by:raveenb
2 Comments
 
LVL 2

Accepted Solution

by:
JYoungman earned 100 total points
ID: 2007047
Buy a copy of Cheswick & Bellovin's "Firewalls and Internet Security" book.  Also Grafinkel & Spafford's "Practical Unix Security".

Also, turn off caps lock.
0
 
LVL 3

Expert Comment

by:junfeb
ID: 2007048
Here is a very good security Link. I have used this link several times for
establishing security.

http://www.deter.com/unix/ 

The links in this page are an excellent source of information , to set up a good secure system.

You can get to 100s of URLs from here.

If you'd like more information, please post.

Thanks.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
This tech tip describes how to install the Solaris Operating System from a tape backup that was created using the Solaris flash archive utility. I have used this procedure on the Solaris 8 and 9 OS, and it shoudl also work well on the Solaris 10 rel…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now