This part of the book is directed primarily towards the UNIX system administrator. It describes how to configure UNIX on your computer to minimize the chances of a break-in, as well as to limit the opportunities for a nonprivileged user to gain superuser access.
Chapter 7, Backups, discusses how and why to make archival backups of your storage. It includes discussions of backup strategies for different types of organizations.
Chapter 8, Defending Your Accounts, describes ways that a computer cracker might try to initially break into your computer system. By knowing these "doors" and closing them, you increase the security of your system.
Chapter 9, Integrity Management, discusses how to monitor your filesystem for unauthorized changes. This includes coverage of the use of message digests and read-only disks, and the configuration and use of the Tripwire utility.
Chapter 10, Auditing and Logging, discusses the logging mechanisms that UNIX provides to help you audit the usage and behavior of your system.
Chapter 11, Protecting Against Programmed Threats, is about computer viruses, worms, and Trojan horses. This chapter contains detailed tips that you can use to protect yourself from these electronic vermin.
Chapter 12, Physical Security. What if somebody gets frustrated by your super-secure system and decides to smash your computer with a sledgehammer? This chapter describes physical perils that face your computer and its data and discusses ways of protecting them.
Chapter 13, Personnel Security, examines concerns about who you employ and how they fit into your overall security scheme.