Chapter 2 Secure Installation and Configuration

Table of Contents

2.1 Pre-Installation Tasks
2.2 Installing Oracle Linux
2.2.1 Shadow Passwords and Hashing Algorithms
2.2.2 Strong Passwords
2.2.3 Separate Disk Partitions
2.2.4 Encrypted Disk Partitions
2.2.5 Software Selection
2.2.6 Network Time Service
2.3 Post-Installation Tasks

This chapter outlines the planning process for a secure installation and describes how the choices that you make during installation affect system security.