Unix Security

1356 Words3 Pages

An Overview of UNIX Security

The purpose of this paper is to analyze the security of UNIX. Considerations shall be given regarding generalized security aspects of a typical UNIX system. The ultimate scope of the following presentation shall remain within the boundaries of a few of the more critical UNIX security aspects. Of particular note will be discussion regarding standard user access, root access, file system security, and internet access precautions. This will not focus on specific measures used to implement security, but rather will investigate both pros and cons typical of a UNIX installation. Finally, a brief description of UNIX security versus other operating systems will be noted.

Since no two UNIX-based operating system builds are exactly alike, it is important to note that each build may have its own inherent security flaws. For example, in 2002 a buffer overflow issue existed within Linux which could potentially make all Linux builds vulnerable (PCWorld). However, this flaw involved only elements which were specific to the Linux kernel and did not impact other build versions such as those specific to Solaris. Nonetheless, while different security flaws may exist, many builds share similar security features, including the specific security aspects noted in this paper's scope.

Virtually all UNIX-based or UNIX-like systems require specific log on procedures. Depending upon an individuals access permissions, one is generally assigned an account or group with which to access terminals or workstations. User accounts, as these are typically described, can generally be assigned different access credentials depending on that individual's requirements. For the most part, user accounts have a limit to which a...

... middle of paper ...

... with organization. Step back and make sure it flows. This was not bad, but make sure you ask your self why this paragraph came before that one.

Overall Very Good job.

All Class

Most people are starting to grasp the importance of the Scope of Work. But many of the papers did not have a clear Purpose statement. Remember you must explain to your reader why your topic is important. For example, maybe knowledge of this topic will save the company time or money. Or perhaps it enhances their disaster recovery or security program. Pretend tend these topics have been assigned to you by your employer or that you are a consultant and these are topics the client is paying you to research.

References

Linuxdevcenter.com (2006). Retrieved on August 5th, 2006.

PCWord.com (2002). Retrieved on August 5th, 2006.

Wikipedia.com (2006). Retrieved on August 4th, 2006.

More about Unix Security

Open Document