Enhancing Security | 4 |
|
By vigilantly adhering to security policies and practices, you can minimize the threat to system integrity and data privacy.
Mac OS X Server is built on a robust UNIX foundation that contains many security features in its core architecture.
Use this chapter to stimulate your thinking. It doesn’t present a rigorous planning outline, nor does it provide the details you need to determine whether to implement a particular security policy and assess its resource requirements. Instead, view this chapter as an opportunity to plan and institute the security policies necessary for your environment.
About Physical Security
The physical security of a server is an often overlooked aspect of computer security. Anyone with physical access to a computer (for example, to open the case, or plug in a keyboard, and so forth) has almost full control over the computer and the data on it. For example, someone with physical access to a computer can:
ÂÂ Restart the computer from another external disc, bypassing any existing login mechanism.
ÂÂ Remove hard disks and use forensic data recovery techniques to retrieve data. ÂÂ Install
In your own organization and environment, you must decide which precautions are necessary, effective, and
For example, in an organization where
51