From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Reviewing accounts

Reviewing accounts - Linux Tutorial

From the course: Linux Hardening

Reviewing accounts

Welcome back to Cybrary's course on Linux Hardening. I'm your instructor, Corey Holzer. And in this lesson, we'll be reviewing accounts. In this lesson, we have four objectives. The first focuses on the concept of least privileges. The second covers the use of groups for assigning permissions. The third objective is the review of users permissions and group associations. The last objective focuses on how to monitor user activity. The concept of least privilege is a linchpin in cybersecurity. Let's say administrator Bob knowingly or accidentally gives user Alice access to all of the personally identifiable information, or PII, of all the employees at Acme, Inc. Later, Ted the hacker compromises Alice's user account. At this point, Ted now has access to all of the PII of the employees at Acme, Inc. He can now use, or worse, sell the information multiple times over. This puts all of the employees at risk for identity theft or exposes them to scams and other malicious activities. While we…

Contents