Team LiB
Previous Section Next Section

Chapter 5: Files, Directories, and Security

Overview

SOLARIS 9 EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • Describe the purpose, features, and functions of root subdirectories, file components, file types, and hard links in the Solaris directory hierarchy.

  • Explain how to create and remove hard links in a Solaris directory.

  • Identify the procedures and commands, variables, or permissions to monitor and control system access, switch users on a system, and restrict access to data in files.

Good security measures are critical to the safety of your data and your company. In Chapter 4, "User and Group Administration," you looked at setting up user accounts and learned how passwords are used to protect login access to the network. But beyond the login, additional security measures are needed to ensure that users have access only to the information that they are supposed to have access to. This is where file and directory security comes into play.

To understand how to set up and manage file and directory security, you first need to understand how files and directories are organized in Solaris. Also, some directories in Solaris are intended for specific purposes, and you need to know what they are.

This chapter starts with file and directory concepts. Some of this information might seem straightforward if you have Solaris experience. However, even if you are already comfortable with file and directory structure, you will agree that this knowledge is fundamental to understanding system security concepts. Moving from core file concepts, this chapter then covers the default directories and their intended purposes. Finally, you will explore security, the most critical concept of this chapter, and arguably one of the most important facilities in a real networking environment.


Team LiB
Previous Section Next Section
This HTML Help has been published using the chm2web software.