Enhancing Security of Unix Systems
نویسنده
چکیده
This paper examines the common threats to data security in open systems highlighting some of the more recent threats, and looks at some of the tools and techniques that are currently available to enhance the security of a Unix system. Since many programs are written without security issues in mind, the topic of secure programming methodologies is also discussed, with some examples of coding techniques that avoid security vulnerabilities.
منابع مشابه
Practical Security Systems with Smartcards
Secure hardware is a useful tool for enhancing computer system security. Traditionally, researchers have attempted to build secure operating systems by creating secure hardware and developing on top of it. Our approach is to integrate commodity secure hardware, i.e., smartcards, into existing operating systems. This paper describes three projects aimed at practical secure operating systems base...
متن کاملUNIX and Security: The Influences of History
UNIX has a reputation as an operating system that is difficult to secure. This reputation is largely unfounded. Instead, the blame lies partially with the traditional use of UNIX and partially with the poor security consciousness of its users. UNIX's reputation as a nonsecure operating system comes not from design flaws but from practice. For its first 15 years, UNIX was used primarily in acade...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملIntroduction to Unix Security for Security Practitioners
In an age of increasingly sophisticated security tools (e.g., firewalls, virtual private networks, intrusion detection systems, etc.), many people do not consider operating system security a very sexy topic. Indeed, given that the UNIX operating system was originally developed in 1969 and that multiple full-length books have been written on protecting UNIX machines, one might be tempted to dism...
متن کاملSpecifying and Checking UNIX Security Constraints
We describe a system called Mir o for specifying and checking security constraints. Our system is general because it is not tied to any particular operating system. It is exible because users express security policies in a formal speci cation language, so it is easy to extend or modify a policy simply by augmenting or changing the speci cation for the current policy. Finally, our system is expr...
متن کامل