This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.