Thursday, May 21, 2020

Unix Security Essay - 1353 Words

An Overview of UNIX Security The purpose of this paper is to analyze the security of UNIX. Considerations shall be given regarding generalized security aspects of a typical UNIX system. The ultimate scope of the following presentation shall remain within the boundaries of a few of the more critical UNIX security aspects. Of particular note will be discussion regarding standard user access, root access, file system security, and internet access precautions. This will not focus on specific measures used to implement security, but rather will investigate both pros and cons typical of a UNIX installation. Finally, a brief description of UNIX security versus other operating systems will be noted. Since no two UNIX-based operating†¦show more content†¦Of the utmost security concern is the protection of the root account. The root account allows a user absolute control of the system, including the ability to alter practically every aspect of the systems, from individual files to installed programs. Inde ed, an entry in Wikipedia.com notes, that a UNIX administrator should be much like Clark Kent, only using the root account, or becoming Superman, when absolutely necessary, lest the security of the account be compromised (2006). Ultimately, this implementation represents a near surefire way to protect the system against many internal and external threats. By ensuring regularly scheduled root account password changes and ensuring the passwords are strong, the cons noted previously should be relatively easy to avoid. File system security is also very important regardless of the UNIX implementation. UNIX files system security generally allows access permissions to be granted to various defined users and groups. UNIX also contains an access right flag know as the sticky bit. The sticky bit can be used to allow users and groups write access to certain directories within the system. Similarly, the sticky bit can be used by a user to disallow other users with access to the same direc tory to alter the contents of the file. The file can only be altered by the file owner, the directory owner, and the root account (linuxdevcenter.com, 2006). This particular element allows for a great deal of controlShow MoreRelatedA Project On Capstone Project1039 Words   |  5 Pagesapplications came from? Well there are a lot of computer applications like local security applications, protocols, well I am going to explain some security applications to you. There are many kinds of different security applications. I am going to explain two of different applications Linux and security policy settings. Now what are security policies? Security policy settings in Microsoft could be used as part of all of our security implementation to make sure and to secure domain controllers, servers, clientRead MoreWin32 Api and Posix Api Comparison984 Words   |  4 PagesMicrosoft’s core set of application programming interfaces available in the Microsoft Windows operating systems while POSIX API, an acronym for â€Å"Portable Operating System Interface (for Unix)† is a core set of application programming interfaces, shell, and utilities interfaces for software compatible with variants on the Unix operating system. Each of which has its own style of implementation. Win32 and POSIX API have processes that needed several resources to execute, and if resources are availableRead MoreFile Management Essay768 Words   |  4 Pagesis the permission to run or execute a file. A UNIX system sets up three classifications for its users; an owner or user, a group, and the other. First is the owner, which is the creator of a file, or the user at a specific time of a file. A group is a class to which the user or owner belongs. A group could be a department of a company or any other type of grouping with specific members. Last, the other is the general World Wide Web audience (â€Å"Unix Protection and Permissions†, n.d.). A reviewRead MoreUnix Operating System5471 Words   |  22 PagesAbstract This paper is a general overview of Unix operating system. It starts by presenting a brief history of the early development of Unix. It concentrates on main aspects of Unix operating system. Key concepts covered are interactive multi-user operating systems, the design objectives of Unix, file-store organization, text processing and programming, the role of C programming language with regard to portability and reliable system software, process control (signals and fork), error loggingRead MoreUnit 2 Assignment 11905 Words   |  8 PagesStickykeys, ShowSounds and Mousekeys. Features of UNIX Operating system Kernel The kernel feature is the hub of Unix operating system. It interacts directly with the machine’s hardware in the system. Its major functions are to control access to the computer, to manage computer memory, to maintain file system, to handle interrupts and errors and to perform input and output services. Shell The shell feature is a command line interpreter (CLI) in Unix operating system. It essentially listens to theRead MoreComputer Operating System3141 Words   |  13 Pagesbecome accustomed to so many choices. One of the major choices in the modern era is the â€Å"Operating System (OS)†. Operating systems are the central software component to any computer. The main brands of operating system are; Windows Mac OS, Sun Solaris, UNIX, DOS and Linux. Each brand has its own take on what makes up an operating system. Windows is the most commonly used operating system around the world. The most common advantage about Windows is its simplicity. It is now very easy for an inexperiencedRead MoreHistory And Philosophy Of Open Source818 Words   |  4 Pagesto a lesser extent, have come to accept malware and viruses as an inevitable part of computing, but they are an incredibly rare sight in properly-managed Linux and BSD (a UNIX-like kernel similar to Linux) environments, which are conse quently used in nearly any situation in which security is imperative. Aside from security and customization, open software has numerous other advantages over its proprietary counterparts, but open source includes more encompasses more than just software. Open hardwareRead MoreEssay on The Linux1482 Words   |  6 PagesThe Linux was originally founded by Linus Torvalds. In 1991, he was a second year computer science student in Finland. He sought after an operating system that was similar to the UNIX system, but both UNIX and the hardware it ran on were excessively expensive. A UNIX version called Minix was available for free, but it did not reasonably meet his needs as it was simply an operating system for students, designed primarily as a teaching tool rather than an industry strength operating system. As a resultRead MoreEssay about UNIX and Windows1218 Words   |  5 PagesUNIX and Windows About Unix The Unix operating system is a powerful programming environment designed by and for computer programmers. Unix is available on a wide variety of computer systems, including personal computers, workstations, mainframes and supercomputers. It was developed for, and is particularly well suited to, multi-user systems, but is now also run on stand-alone machines. Beginners and casual users often find the jargon-filled help system frustrating and the lack ofRead MoreIs418 Project 1-2-3 Essay example1327 Words   |  6 PagesIS-418: Security Strategies in Linux Platforms and Applications * Project: Linux – Based Web Application Infrastructure * Project: Logistics * Project Part 3: Executive Summary * Project Part 3: Tasks 1 * Project Part 3: Tasks 2 * Project Part 3: Tasks 3 IS-418: Security Strategies in Linux Platforms and Applications * Project: Linux – Based Web Application Infrastructure * Project: Logistics * Project Part 3: Executive Summary * Project

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.