Using secure protocols is a critical part of maintaining system integrity. This part describes critical tools used for the purpose of user authentication, network access control, secure network communication, and intrusion detection. For more information about securing a Red Hat Linux system, refer to the Red Hat Linux Security Guide.