From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Hardening storage devices

Hardening storage devices - Linux Tutorial

From the course: Linux Hardening

Hardening storage devices

Hello, and welcome to Cybrary's Linux Hardening course. This lesson is the hardening of the storage devices. I am your instructor, Corey Holzer. The objectives for this lesson are threefold. First, I want you to have knowledge. You need to articulate the goal of encryption as a means for protecting data at rest. At the end of this lesson, you will be able to articulate the role of the Access Control Lists. Lastly, you'll be able to define the concept of world-writable files and explain to someone why they are so dangerous. Since protecting data at rest is the purpose behind securing storage devices, let's define data at rest. Simply put, data at rest is a term given to files and data contained on a storage device, while those files are not currently in use. Therefore, files open in editors or files being transmitted as attachments or downloads are considered data in transit and do not qualify as data at rest. There are three options for encryption. We can encrypt individual files…

Contents