Differences between trusted and non-trusted systems?

Trusted system  : Enabled for all of below functions.
Non-trusted system : Disabled for all of below functions.

System auditing
enables tracing every system call issued by users on the system.

Improved password management includes:
- grace period and expiration period for password
- password aging
- specific account life
- disable login after repeated login failures
- random password generator


Login Restrictions includes :
- disabling and locking accounts
- Setting accounts to be accessed only at certain times of the day
- account location accessat specific devices, workstations, etc.
- a single-user boot password.

Shadowed passwords
- kept in locations other than /etc/passwd.
- prevents users from viewing the /etc/passwd file
- prevents hackers from running "password cracker programs" against passwords in the /etc/passwd file

Popular posts from this blog

Howto configure boot device order on ILOM

SAN Switch Config Command

Howto cstm on HP-UX