UNIX and Linux Security

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There are many objectives and goals to be considered when securing a UNIX operating system. When configuring UNIX operating system security, consider these critical principals of security, known as the confidentiality, integrity, and availability (CIA) triad. In addition to incorporating security controls that relate to the CIA triad, three additional security features directly affect CIA and aid the overall site security program: access control, auditing, and backups. Although general UNIX considerations are covered in this chapter, it also addresses several Linux-specific items. This chapter is for all Linux variants; file names, directory paths, variable names, etc., also may have to be taken into consideration. There are numerous versions of Linux, and it would be beyond the scope of this chapter to try to discuss all of them in detail. All requirements listed within this chapter will pertain to all versions of Linux unless explicitly noted otherwise.

Cite

CITATION STYLE

APA

Beuchelt, G. (2017). UNIX and Linux Security. In Computer and Information Security Handbook (pp. 205–224). Elsevier. https://doi.org/10.1016/B978-0-12-803843-7.00011-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free