Lecture
From the very first versions, the Unix operating system was developed as a multi-user multitasking operating system. It was supposed to provide simultaneous work of several users working with different applications. Thus, it was necessary to protect users from each other and prevent unauthorized access, accidental or malicious. Therefore, the security system in the OS of the Unix family is given a lot of attention. There are currently many different versions of the Unix family of operating systems, but they all support a single security model. Some modern versions of systems support various extensions and enhancements to the security system, which the administrator can read from the reference guide for these systems. In the future we will consider the traditional security model of operating systems of the Unix family.
Comments
To leave a comment
Information security, Cryptography and cryptanalysis, Steganography and Stegoanalysis
Terms: Information security, Cryptography and cryptanalysis, Steganography and Stegoanalysis