Security
Security takes many forms in a computing environment. This chapter
gives examples of three different types of security; access, prevention
and detection. Access for users is usually handled by
login or an application designed to handle the login
function. In this chapter, we show how to enhance
login by setting policies with
PAM modules. Access via networks
can also be secured by policies set by
iptables. Prevention of breaches, like
trojans, are assisted by applications like gnupg,
specifically the ability to confirm signed packages, which prevents
modification of the tarball after the packager creates it. Finally, we touch on
detection with a package that stores "signatures" and then regenerates those
"signatures" and compares for files that have been changed.
&shadow;
&Linux_PAM;
&iptables;
&postlfs-security-fw;
&gnupg;
&tripwire;
&postlfs-security-syslog;