Lesson14.Optimizing Data Confidentiality


Lesson 14. Optimizing Data Confidentiality

Time

This lesson takes approximately 2 hours to complete.

Goals

Review standard UNIX permissions

Configure appropriate file-system permissions and ACLs to provide data security

Determine when to use SUID and GUID permissions

Audit for inappropriate SUID and GUID permissions

Restrict the administrator's home folder permissions so that other users cannot browse it

Learn the location and function of file-system access control lists

Configure Mac OS X computers for optimum data confidentiality by encrypting sensitive data on the local file system

Understand the encryption features of FileVault

Create a secure documents folder by encrypting a disk image

Disable possible data leaks by encrypting the swap space, wiping clean free space, and using secure empty trash


In a collaborative, networked computing environment, the ability to share your information with others benefits group productivity. However, controlling access to that data is of incredible importance; information accidentally made available to the wrong person can seriously compromise the success of your project or company.

In this lesson, you will work with several security techniques to ensure that only intended recipients see the data you want to share.




Apple Training Series. Mac OS X System Administration Reference, Volume 1
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors: Schoun Regan

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net