Chapter 2 “OpenVMS Security
Model”Chapter 2 introduces
the reference monitor concept of security design and provides an
overview of the operating system's security features.
Describes security actions and features for the general user.
Chapter 3 “Using the System Responsibly”Chapter 3 provides information for the general
user about the login and logout processes and the responsible use
of passwords.
Chapter 9 “Security Auditing”Chapter 10 describes
how to recognize when a system is under attack and how to protect
and defend your system.
Chapter 10 “System Security Breaches”Chapter 11 describes
security-related actions specific to clustered systems, such as
setting up common system files and synchronizing authorization data.
Appendix A “Assigning Privileges”Appendix A provides
a summary of all the user privileges available on the operating
system and describes who may need them.