The chapters in this part discuss the following topics:
Role of a security administrator (“Managing the System and its Data”)
Securing the system (“Managing System Access”)
Securing data and resources (“Controlling Access to System Data and Resources”)
Using encryption (“Using Encryption”)
Security auditing (“Security Auditing”)
Responding to security breaches (“System Security Breaches”)
Creating a secure cluster (“Securing a Cluster”)
Considerations for networked systems (“Security in a Network Environment”)
Setup and management of protected subsystems (“Using Protected Subsystems”)
This part of the manual also includes information on the following topics:
User privileges and who may need them (“Assigning Privileges”)
Default UIC-based protection of critical system files (“Protection for OpenVMS System Files”)
Examples of security alarm messages (“Alarm Messages”)
Table of Contents