16
Chapter 1. Security Overview
Access control lists (ACLs)
File integrity auditing software
1.2.3. Administrative Controls
Administrative controls define the human factors of security. It involves all levels of personnel within
an organization and determines which users have access to what resources and information by such
means as:
Training and awareness
Disaster preparedness and recovery plans
Personnel recruitment and separation strategies
Personnel registration and accounting
1.3. Conclusion
Now that you have learned a bit about the origins, reasons and aspects of security, you can determine
the appropriate course of action with regards to Red Hat Linux. It is important to know what factors
and conditions make up security in order to plan and implement a proper strategy. With this informa
tion in mind, the process can be formalized and the path becomes clearer as you delve deeper into the
specifics of the security process.
footer
Our partners:
PHP: Hypertext Preprocessor Best Web Hosting
Java Web Hosting
Inexpensive Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Jsp Hosting
Cheap Hosting
Visionwebhosting.net Business web hosting division of Web
Design Plus. All rights reserved