Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.