Nobody downloaded yet

Practical UNIX Security - Assignment Example

Comments (0) Cite this document
Summary
Introduction The widespread use of computing technology has facilitated small, medium and corporate organizations to achieve goals in an efficient way. The revolution of Information Technology has created new trends of doing business and communication. Moreover, the technology has provided a new approach of operating businesses during the past several years, and continues to provide many benefits as it spreads all over the globe…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Practical UNIX Security
Read TextPreview

Extract of sample
"Practical UNIX Security"

Download file to see previous pages However, these modules require frequent updates for virus definitions and new threats, which may affect the network anytime. Every now and then, new threats are designed and developed by hackers or cyber criminals. In spite of securing the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to intrude into the network. In addition, hackers and cyber criminals are exploring efficient codes day by day to improve the hacking software, in order to breach in to classified information, banks, online websites etc. As the threats and vulnerabilities are infinite, no one can memorize them in order to take a measured approach, the initial step is to identify the vulnerability type. An organization named as CVE (Common Vulnerabilities and Exposure) provides a database to search for a particular public known vulnerability. The sponsors for CVE are US-CERT and managed by MITRE Corporation. The goal is to provide common names for all publicly known security threats and exposures. In order to extract information from CVE, access of National Vulnerability Database is mandatory (NVD) (Cve. 2011). (CVE) The Standard A comprehensive definition is available on the CVE website, which states as “Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known information security vulnerabilities, while its Common Configuration Enumeration (CCE™) provides identifiers for security configuration issues and exposures. CVE’s common identifiers make it easier to share data across separate network security”. One more definition available in network dictionary states it as “common vulnerabilities and exposure is an emerging refers industry standard for identifying and naming vulnerabilities and various other information security exposures” (Common Vulnerabilities and Exposures. 2007). The primary objective of CVE is to provide a separate database accessible, in order to find out all the known threats and vulnerabilities currently, with the help of tools and services. What is CVE 3872 ? As CVE 3872 is a threat that operates on web technologies, before understanding CVE 3872, it is vital to focus on some of the web technologies that are associated with CVE 3872. Common Gateway Interface A newly developed website providing information must possess a database to store information, which is published on the website. In general, many people on the Internet will visit the website and access information, which is extracted from the database. This is where the importance of Common Gateway Interface (CGI) becomes useful. Dave Chaffy defines it as “A method of processing information on a web server in response to a customer’s request. Typically, a user will fill in a Web-based form and a CGI script (application) will process the results. Active Server Pages (ASP) are an alternative to a CGI script” (Chaffey 2006). Moreover, if the users query the database of the website, the CGI script will transmit the queries to the database and retrieves results on the website. It has become a standard for synchronizing information servers from external web applications. CGI is eminent in the form of a plain HTML file which his static, while CGI operates in a real time environment to display dynamic contents on a website. An ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Practical UNIX Security Assignment Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1409842-practical-unix-security
(Practical UNIX Security Assignment Example | Topics and Well Written Essays - 2500 Words)
https://studentshare.org/family-consumer-science/1409842-practical-unix-security.
“Practical UNIX Security Assignment Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/family-consumer-science/1409842-practical-unix-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
MSc computer system security 'Practical Windows Security'
...? Practical Windows Security Contents Introduction to windows security and vulnerabilities 3 The use of remote procedurecall 5 CVE- 2003-0352 7 Mitigating Factors 9 Security solutions 9 Conclusion 10 Reference List 12 Introduction to windows security and vulnerabilities A Windows system is prone to security threats once it is used as an internet server. The typical installation of the windows NT/2000 and other vulnerabilities makes it an easy target for attackers. This way computer networks are damaged on a regular basis. Although network security has improved and strengthened over time but so have the attackers advanced...
9 Pages(2250 words)Essay
MSc Practical UNIX Security
...?Practical UNIX Security Table of Contents Introduction UNIX is the most popular operating system which has been used extensively, and a lot of people still use it as it has been used in the past. However, a lot of IT experts who used UNIX systems in the earlier period discovered it inflexible from the security point of view. As its control was inspiring, its command-line interface needed technological proficiency; its grammar or syntax was not perceptive, and its interface was not user friendly. However, in the IT market, the UNIX operating system has been the medium for broad transformations that have authorized...
8 Pages(2000 words)Essay
Practical UNIX Security
...varieties of Unix are GNU/Linux, Sun Solaris and MacOS X (Rosen Kenneth H., 2006). UNIX security is the way of protecting a UNIX or any other Unix-like operating system (Ross Seth T., 2000). A safe atmosphere cannot be obtained by just designing conception of these operating systems but by observant administrative and user practices. LDAP that is Lightweight Directory Access Protocol is nothing but an application protocol used for editing and reading directories over an internet protocol network (Morimoto Rand, 2008). Directory here refers to the set of organized records, for instance, a telephone directory is organized in an...
10 Pages(2500 words)Assignment
MSc Practical UNIX Security ''LDAP''
...and raising the Active directory domain functional level to Windows 2003. Moreover, for Linux / UNIX, ‘identity management module’ installation is required on the domain controller along with the configuration of NIS server. LDAP Account Management In order to manage account in the UNIX network environment, the Unix systems are configured with Microsoft Active directory for centralized management of user accounts. Moreover, it also solidify network security by integrating role based access and Kereberized authentication. Consequently, the operational cost is minimized, for the management of UNIX accounts. Moreover, UNIX contains various...
8 Pages(2000 words)Essay
Practical
...? Practical Report on Children and Young People’s Self Identity Children and young people exhibit differences in the way they behave and how they relate with other people, which constitute their personality and individual character traits. This largely involves how children develop a sense of identity in the way they see themselves and how other people view them. This sense of identity develops and changes through a period of time along their childhood. Every person has a unique gradual development of a sense of autonomous and individuality which is relatively different from other people. This concerns the child’s social behavior and his own view about how people relate with him or her depending on the expectations of...
7 Pages(1750 words)Essay
Linux vs HP-UNIX
...the following: large address spaces, protection, memory mapping, fair physical memory allocation, shared virtual memory." (Rusling, David, 1999) Security There are many built-in security tools that are available with UNIX as well as patches that are necessary to keep the operating system fully secure. These network security tools include: Ipacl: forces all TCP and UDP packets to pass through an access control list facility Logdaemon: provides modified versions of rshd, rlogind, ftpd, rexecd, login and telnetd Portmap: a replacement for the standard portmap program that attempts to close all known holes in portmap This includes prevention of NIS...
4 Pages(1000 words)Essay
UNIX
..., will find the 3D desktop interface quite a charming working tool with host of features to tinker with. 4. The desktop with the 3D interface works faster than the traditional interface. The UNIX operating system enables the speed to increase as the system is an upgraded version. 5. The 3D interface is a creative means to perform both graphic and text tasks. The graphics, especially, come out in a very presentable 3 dimensional format that comes out poignant in PowerPoint presentation. This is a far improvement over the 2D interface. Disadvantages 1. The 3D interface is considered weak to maintain the strength of the network. Its feasibility and overall practicability is in question. 2. It may prove hard...
8 Pages(2000 words)Essay
Practical Windows Security
...Practical Windows Security against CVE-2003-0352/MS03-026 Table of Contents Introduction Common Vulnerabilities and Exposures or simplyCVE is a record of information security vulnerabilities and experiences that intend to offer frequent names for publicly recognized problems. The objective of Common Vulnerabilities and Exposures is to make it rather easier to share data all through the alienated vulnerability potentials (repositories, expert tools as well as services) by means of this "common enumeration. Additionally, through a widespread identifier it becomes easy to dispense data all through separate services, since many records and various tools until the arrangement of CVE in the...
10 Pages(2500 words)Assignment
UNIX SHELLS
...UNIX Shells Introduction Unveiled in 1960s, UNIX is a requisite operating system whose enhancements since then up to date present users with heightened enjoyment as well as flexibility while using a computer (Ramesh, 2010). This is especially undertaking varied tasks that entail numerous commands whereby without its speed their execution would not have been possible in the current state of technological knowhow. To execute these tasks, it normally utilizes shells whose role encompasses acting as an interface amid the user and kernel whereby after login by the user the program scrutinizes the availed information to align appropriately (Ramesh, 2010). Hence, interpreting login commands that will result to...
2 Pages(500 words)Essay
Practical
................................................................................................................................................10 Task 3.............................................................................................................................................11 Syntax used to create Data.............................................................................................................12 References......................................................................................................................................14 Introduction The project is the practical steps that lead to the design and implementation of an oracle database for a company called The Concert...
10 Pages(2500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Assignment on topic Practical UNIX Security for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us