This part of the book provides a basic introduction to computer security, the Unix operating system, and security policy. The chapters in this part are designed to be accessible to both users and administrators.
Chapter 1, takes a very basic look at several basic questions: What is computer security? What is an operating system? What is a deployment environment? It also introduces basic terms we use throughout the book.
Chapter 2, explores the history of the Unix operating system, and discusses the way that Unix history has affected Unix security.
Chapter 3, examines the role of setting good policies to guide protection of your systems. It also describes the trade-offs you will need to make to account for cost, risk, and corresponding benefits.