Gives
security administrators an overview of security issues, conceptual
design features, and security features specific to OpenVMS systems.
“Understanding System Security” Chapter 1
discusses levels of security requirements and describes three sources
of security failures.
“OpenVMS Security Model” Chapter 2
introduces the reference monitor concept of security design and provides
an overview of the operating system's security features.
Describes
security actions and features for the general user.
“Using the System Responsibly” Chapter 3
provides information for the general user about the login and logout
processes and the responsible use of passwords.
“Using Encryption” Chapter 9 describes how to use encryption.
which transforms a file into unrecognizable, unintelligible data,
even if someone manages to gain access to it.
“Security Auditing” Chapter 11
describes how to recognize when a system is under attack and how to
protect and defend your system.
“System Security Breaches” Chapter 12
describes security-related actions specific to clustered systems,
such as setting up common system files and synchronizing authorization
data.