Create and apply suitable access, ownership, and authentication techniques for Linux systems in given scenarios.
Examples: privilege escalations, file, directory, and context-based permissions; pluggable authentication module (PAM), Secure Shell (SSH), teletypes (TTYs), pseudo terminal (PTYs), public-key infrastructure (PKI)