"Donald A. Tevault" <[EMAIL PROTECTED]> writes:
> > 2. bootloader security
> > 
> > There must be more to it that 'put a password on it' :)
> > 
> There is another aspect to this that I just thought of.
> 
> You'll also want to emphasize the importance of physical security in
> this regard.  If an attacker can get physical access to a machine, he
> can just boot off of a live Linux CD, mount the harddrive, and get
> whatever he wants with full root privileges.  All the bootloader
> security in the world won't mean a thing in this instance.

Another unstated goal for me with this exam is not to overlap what the CISSP
(and the SSCP?) cover.

I think that they do an amazing job but I would like to focus on the security
issues that are Linux specific.  Social engineering, IMHO, is well tested by
the ISC2 guys.

This is also the reason that I dropped a lot of the boring down into hardware
details and networking details on the LPIC-1 exams.  x86 and TCP/IP packet
formats aren't really Linux specific (not to mention kinda mean to test on a
newbie).


PS - I also think that it would be really cool if the ISC2 and LPI teamed
        up to jointly cross promote their security plus LPI's linux specific
        cert in some way.  Anyone on the list work for ISC2 or know them? :)

Regards,
-- 
g. matthew rice <[EMAIL PROTECTED]>      starnix care, toronto, ontario, ca
phone: 647.722.5301 x242                                  gpg id: EF9AAD20
http://www.starnix.com              professional linux services & products
_______________________________________________
lpi-examdev mailing list
lpi-examdev@lpi.org
http://list.lpi.org/cgi-bin/mailman/listinfo/lpi-examdev

Reply via email to