unit 2 css
unit 2 css
2. User Accounts
1. Each user gets a unique UID (User Identifier) and a
home directory.
2. Accounts can be standard users or administrative
(superuser).
3. Passwords are required for secure access to accounts.
4. User account settings are stored in /etc/passwd and
/etc/shadow.
5. System administrators manage accounts and access
permissions.
6. User accounts are restricted from accessing critical
system files.
7. Disabled or unused accounts are removed to reduce
vulnerabilities.
8. Strong password policies (length, complexity) are
enforced.
9. Users can belong to one or more groups to manage
access.
10. Temporary accounts are created with expiration
dates for contractors or guests.
3. Superuser (Root)
1. The superuser (root) has unlimited privileges over the
system.
2. Root can access all files, change configurations, and
manage users.
3. Root access is restricted and logged to prevent misuse.
4. Using the sudo command allows limited root access for
other users.
5. Running processes as root unnecessarily is a security
risk.
6. Root should use secure methods like SSH with key
authentication.
7. Tools like SELinux and AppArmor restrict root-level
actions.
8. Logging and auditing root activities help detect
unauthorized actions.
9. Avoid direct root logins; use privileged accounts instead.
10. Compromised root access can lead to full system
control for attackers.
4. Groups
1. Groups allow users to share access to files or directories.
2. Each user is assigned a primary group and can belong to
multiple groups.
3. Group information is stored in /etc/group.
4. Files and directories have group ownership for
collaborative access.
5. Group permissions are applied to all members.
6. Administrators manage group memberships using
usermod or gpasswd.
7. Secondary groups provide additional access without
changing the primary group.
8. Groups make managing permissions for teams easier.
9. Group policies enforce resource access boundaries.
10. Proper group assignments prevent unauthorized
access.
5. Login/Password
1. Logging in requires a username and password for
authentication.
2. Passwords should be strong and changed regularly.
3. The login process verifies user identity before granting
access.
4. Failed login attempts are logged to track suspicious
activities.
5. Secure methods like SSH are used for remote logins.
6. Two-factor authentication (2FA) adds an extra security
layer.
7. Passwords are stored securely in the shadow file, not in
plaintext.
8. Account lockout policies prevent repeated login
attempts.
9. Only authorized users can log in to critical servers.
10. Login prompts should not reveal system details.
7. The Inode
1. Inodes store metadata about files, like size, permissions,
and ownership.
2. Each file and directory on a filesystem has a unique
inode.
3. Inodes don’t store file names, only pointers to data
blocks.
4. Commands like ls -i display the inode number of files.
5. Inodes track permissions, modification times, and file
links.
6. They are crucial for locating files and directories in the
filesystem.
7. Deleting a file removes its inode and frees its storage.
8. Corrupted inodes can cause file system errors.
9. Filesystems have a fixed number of inodes, limiting file
creation.
10. Tools like fsck check and repair inode issues.