A hacker is
someone who masters the inner workings of operating systems and utilities in an effort to better understand them
The root is a highly privileged user ID that has all rights on a system
Authentication is the process of verifying a user’s validity and authority on a system
Every organization should conduct a security audit at least annually and preferably quarterly
The first step in securing your network should be to devise and implement an enterprise-wide security policy