Lines Matching full:security
33 .Nm security
34 .Nd introduction to security under FreeBSD
42 security related topics.
44 Security is a function that begins and ends with the system administrator.
47 multi-user systems have some inherent security, the job of building and
48 maintaining additional security mechanisms to keep users
53 only as secure as you make them, and security concerns are ever competing
62 security becomes an ever bigger issue.
64 Security is best implemented through a layered onion approach.
66 what you want to do is to create as many layers of security as are convenient
69 System security also pertains to dealing with various forms of attacks,
72 Security concerns can be split up into
149 to your security because it will not close off the hole the attacker used to
152 Security remedies should always be implemented with a multi-layered
288 The more indirect security mechanisms also assume that you are logging in
297 a workstation, an attacker can break any sort of security you put on it.
337 onion approach to security still stands: if someone is able to break in
446 Your security scripts should always check for and report changes to
484 the kernel at a higher security level, at least level 1.
485 The security level can be set with a
491 set the security level to 1, write access to raw devices will be denied and
502 up to the point where the security level is set.
504 difficult when you operate at a higher security level.
506 run the system at a higher security level but not set the
520 The kernel runs with five different security levels.
523 The security levels are:
582 The security level can be configured with variables documented in
599 last layer of your security onion is perhaps the most important \(em detection.
600 The rest of your security is pretty much useless (or, worse, presents you with
612 Writing your security scripts on the extra-secure limited-access system
649 A good security script will also check for
656 When using SSH rather than NFS, writing the security script is much more
673 A good security script will also check for changes to user and staff members
703 Finally, security scripts should process the log files and the logs themselves
715 of security features as long as they do not affect convenience, and
716 can add security features that do affect convenience with some added
718 Even more importantly, a security administrator should mix it up
954 Some people consider this as improving system security, so the knobs are
968 .Bl -tag -width security.bsd.unprivileged_proc_debug
969 .It Dv security.bsd.see_other_uids
977 .It Dv security.bsd.see_other_gids
979 .It Dv security.bsd.see_jail_proc
982 .It Dv security.bsd.conservative_signals
990 .It Dv security.bsd.unprivileged_proc_debug