Chapter 26: Unix Security


In this Chapter we provide an overview of Unix Security. We acquaint the reader with a summary of the types of threats that exist on the Internet and what can be done to protect against external hostilities. We also describe the tools that are built into every Mac OS X computer to help safeguard your computer.

Introduction to Unix Security

When considering computer security it’s most important to understand that there is a trade off between ease of use and flexibility versus security. The more secure a system is, the more complex it becomes. Think of your car. You could leave the doors unlocked and keep the key in the ignition. Then you wouldn’t ever need to fumble with the keys to open the doors, and with the keys handily stored in the ignition; you wouldn’t ever have to remember where you left them at night. As far as ease of use, it couldn’t get better. However, you’d be lucky to find your car where you left it; eventually someone else would just open the door, turn the key and drive away with your ride. The same thing goes for your computer. If you are the only user it’s easy to assume that nobody would want anything you’ve got and just leave the “doors” wide open.

The main issue at hand is what you’ve got to protect, and how much you’re willing to put into securing it. The more valuable the asset, the more effort needs to be put into protecting it. In the following Chapter, we discuss the types of threats your Mac OS X system faces, and hopefully enlighten you as to just how attractive your Macintosh can be, and along the way, you’ll learn some of the tricks of the security trade.




Mac OS X Bible, Panther Edition
Mac OS X Bible, Panther Edition
ISBN: 0764543997
EAN: 2147483647
Year: 2003
Pages: 290

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net