Differences between trusted and non-trusted systems?
Trusted system : Enabled for all of below functions.
Non-trusted system : Disabled for all of below functions.
System auditing
enables tracing every system call issued by users on the system.
Improved password management includes:
- grace period and expiration period for password
- password aging
- specific account life
- disable login after repeated login failures
- random password generator
Login Restrictions includes :
- disabling and locking accounts
- Setting accounts to be accessed only at certain times of the day
- account location accessat specific devices, workstations, etc.
- a single-user boot password.
Shadowed passwords
- kept in locations other than /etc/passwd.
- prevents users from viewing the /etc/passwd file
- prevents hackers from running "password cracker programs" against passwords in the /etc/passwd file
Non-trusted system : Disabled for all of below functions.
System auditing
enables tracing every system call issued by users on the system.
Improved password management includes:
- grace period and expiration period for password
- password aging
- specific account life
- disable login after repeated login failures
- random password generator
Login Restrictions includes :
- disabling and locking accounts
- Setting accounts to be accessed only at certain times of the day
- account location accessat specific devices, workstations, etc.
- a single-user boot password.
Shadowed passwords
- kept in locations other than /etc/passwd.
- prevents users from viewing the /etc/passwd file
- prevents hackers from running "password cracker programs" against passwords in the /etc/passwd file