Introduction to Linux Security Model

Security involves defense in depth. Approaching security one step at a time, with consistency and vigilance, you can mitigate the security threats.

You need decide where in this balancing act your system will still be usable yet secure for your purposes.

If you have more than one person logging on to your machine, or machines, you should establish a “Security Policy” stating how much security is required by your site and what authentication ans authorization procedures will be followed.