From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Securing storage devices, part two

Securing storage devices, part two - Linux Tutorial

From the course: Linux Hardening

Securing storage devices, part two

Hello, and welcome back to Cybrary's Hardening Linux course. This is the second half discussion of how to secure storage devices. I'm your instructor, Corey Holzer. In this lesson, there are three objectives. First, I want you to be able to describe how to get and set permissions through access control lists. Second, at the end of this lesson, you will be able to describe how to access ownership of a file and the permissions through some more basic functionality. Finally, you'll be able to explain why we disabled SUID and SGID, as well as how to do so. Being familiar with Linux, you probably already know this, but I would like to quickly review how to retrieve the permissions of a file and what they are. You can find the permissions for any given file with the ls command using the -la option, as well as specifying the file name in order to show information about that particular file. Every file in Linux has permissions associated with the owner of the file, the group owner of the…

Contents