From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Securing storage devices, part one

Securing storage devices, part one - Linux Tutorial

From the course: Linux Hardening

Securing storage devices, part one

Hello, and welcome back to Cybrary's Linux Hardening course. In this lesson, we'll cover the first half of our discussion about securing storage devices. I'm your instructor, Corey Holzer. Should we get started? In this lesson, we have two objectives. First, we'll describe the process for partitioning disks and encrypting volumes. At the end of the lesson, you'll be able to explain how to make a boot partition read-only. In the past, it was a best practice to create multiple volumes in order to ensure each function had sufficient harddrive space. The space issue was important because if the root partition ran out of disk space, it would adversely affect the operation of the system, with the worst effect being the computer would crash. With the drives being smaller and pricier than storage available to us today, partitions were the most cost-effective means to prevent issues like these from arising. Today, adding storage is relatively cheap and the size of drives reduces the risk of…

Contents