You get a bonus - 1 coin for daily activity. Now you have 1 coin

6.2. security tools in OS Unix family

Lecture



  • 6.2.1. Management of access rights to resources
  • 6.2.2. Permissions of processes to resources
  • 6.2.3. Audit

From the very first versions, the Unix operating system was developed as a multi-user multitasking operating system. It was supposed to provide simultaneous work of several users working with different applications. Thus, it was necessary to protect users from each other and prevent unauthorized access, accidental or malicious. Therefore, the security system in the OS of the Unix family is given a lot of attention. There are currently many different versions of the Unix family of operating systems, but they all support a single security model. Some modern versions of systems support various extensions and enhancements to the security system, which the administrator can read from the reference guide for these systems. In the future we will consider the traditional security model of operating systems of the Unix family.

See also


Comments


To leave a comment
If you have any suggestion, idea, thanks or comment, feel free to write. We really value feedback and are glad to hear your opinion.
To reply

Information security, Cryptography and cryptanalysis, Steganography and Stegoanalysis

Terms: Information security, Cryptography and cryptanalysis, Steganography and Stegoanalysis