A computer is as secure as its weakest point of entry. The following task map shows the areas that you should monitor and secure.
Task |
Description |
For Instructions |
---|---|---|
Monitor, permit, and deny user login |
Monitors unusual login activity. Prevents logins temporarily. Manages dial-up logins. | |
Provide strong password encryption |
Specifies algorithms to encrypt user passwords. Installs additional algorithms. | |
Monitor and restrict superuser activities |
Regularly monitors superuser activity. Prevents remote login by a root user. | |
Prevent access to hardware settings |
Keeps ordinary users away from the PROM. |