 | Physical security |
 | Controlling system access |
 | Storing user account information |
 | Controlling file access |
 | Permission schemes for user and group IDs |
 | Access Control Lists (ACLs) |
 | Managing ACL entries |
 | Setting path and identification permission |
 | Monitoring users and system usage |
 | Obtaining login information |
 | Using firewalls and securing network services |
 | Other network security methods |
 | Remote system operations and the trusted host |
 | Restricting FTP |
 | Restricting root access |
 | Monitoring superuser access |
 | Automated Security Enhancement Tool (ASET) |