Solaris CX-310-301 Manual de usuario Pagina 8

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 77
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 7
Solaris 9 Security CX-310-301 7
Using File Listings .................................................................................................................. 40
Using Checksums .................................................................................................................. 40
Using File Digests .................................................................................................................. 40
Using the find Command........................................................................................................ 41
Using Tripwire......................................................................................................................... 42
Kernel Trust and OpenBoot .......................................................................................................45
OpenBoot ............................................................................................................................... 45
File and System Resources Protection....................................................................... 46
User Account Protection ............................................................................................................ 46
Checking for Duplicate Accounts ........................................................................................... 46
Expiring Accounts................................................................................................................... 46
Restricting root Logins............................................................................................................ 48
Dormant Accounts.................................................................................................................. 48
Protecting Passwords ................................................................................................................ 49
Recommendations for a Good Password .............................................................................. 49
Users with No Password ........................................................................................................ 50
Password Aging ..................................................................................................................... 50
Password Cracking Tools....................................................................................................... 51
Limitations of Password Authentication ................................................................................. 52
Non-Login Accounts................................................................................................................... 53
User Security with SU ................................................................................................................ 53
Role Based Access Control .......................................................................................................54
Creating A Profile ................................................................................................................... 55
Associating Executions with a Profile..................................................................................... 55
Creating a Role ...................................................................................................................... 55
Assigning a Role to a User..................................................................................................... 55
Logging in to a Role ............................................................................................................... 56
Listing Roles for a User .......................................................................................................... 56
Listing Profiles for a Role ....................................................................................................... 56
Permissions................................................................................................................................ 56
Directories and Files............................................................................................................... 56
Vista de pagina 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 76 77

Comentarios a estos manuales

Sin comentarios