Hi Ulysses_
Hypothetically: If someone managed to gain access as user X, they would be limited by whatever
rights user X has. If you have sudo on the system and user X has sudo rights, then I don't think
even a root password will stop them from doing whatever they want. In this scenario, removing
sudo and setting the root password would provide an added level of security.
Having said that, for any of that to happen, both machines have to agree to establish a connection.
So if you don't have any programs listening to the network, your machine will not accept any
connection requests, regardless of iptables. To be clear, programs that listen include browsers,
openSSH, file sharing programs, and nc (netcat) among others.
In order for someone to compromise your machine, they need to be able to make changes to it.
Examples include modifying /etc/inittab to make a console available through the network using netcat,
and a cron job that periodically establishes a brief connection with a remote machine and closes it
when it's done to avoid detection. Of course for an exploit to remain persistent, one needs to take
into account TCs backup scheme.
So far all you've described is a machine that boots, is unused, and runs nothing. Perhaps if you give
a little more information about what you wish to do, someone can provide some insight to address
your concerns.