First page Back Continue Last page Overview

 

The Linux Security Model

 
  • Users and groups are used to control access to files and resources

  • Users log in to the system by supplying their user name and password

  • Every file on the system is owned by a user and associated with a group

  • Every process has an owner and group affiliation, and can only access the resources its owner or group can access