“In this series of three articles, you’ll see how to plan,
design, install, configure, and maintain systems running Linux in a
secure way. In addition to a theoretical overview of security
concepts, installation issues, and potential threats and their
exploits, you’ll also get practical advice on how to secure and
harden a Linux-based system. We will discuss minimal installation,
hardening a Linux installation, authorization/authentication, local
and network security, attacks and how to protect against them, as
well as data security, virus, and malware programs.“For this first article, we’ll begin by reviewing the
considerations for securing data and the systems that provide it.
Our goal is to develop a deeper understanding of what security
actually means…”