Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Unix security

From Wikipedia, the free encyclopedia
This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages)
This articlerelies largely or entirely on asingle source. Relevant discussion may be found on thetalk page. Please helpimprove this article byintroducing citations to additional sources.
Find sources: "Unix security" – news ·newspapers ·books ·scholar ·JSTOR
(April 2024)
This article includes a list ofgeneral references, butit lacks sufficient correspondinginline citations. Please help toimprove this article byintroducing more precise citations.(April 2024) (Learn how and when to remove this message)
(Learn how and when to remove this message)

Unix security refers to the means ofsecuring aUnix orUnix-likeoperating system.

Design concepts

[edit]

Permissions

[edit]
Main article:File system permissions

A core security feature in these systems is thefile system permissions. All files in a typicalUnix filesystem have permissions set enabling different access to a file.Unix permissions permit different users access to a file with different privilege (e.g., reading, writing, execution). Like users, differentuser groups have different permissions on a file.

User groups

[edit]

Many Unix implementations add an additional layer of security by requiring that a user be a member of thewheeluser privileges group in order to access thesu command.[1]

Root access

[edit]
Sudo command on Ubuntu to temporarily assume root privileges

Most Unix and Unix-like systems have an account or group which enables a user to exact complete control over the system, often known as aroot account. If access to this account is gained by an unwanted user, this results in a complete breach of the system. A root account however is necessary for administrative purposes, and for the above security reasons the root account isseldom used for day to day purposes (thesudo program is more commonly used), so usage of the root account can be more closely monitored.[citation needed]

User and administrative techniques

[edit]

Passwords

[edit]

Selecting strongpasswords and guarding them properly are important for Unix security.[citation needed]

On many UNIX systems, user and password information, if stored locally, can be found in the/etc/passwd and/etc/shadow file pair.

Software maintenance

[edit]

Patching

[edit]

Operating systems, like all software, may contain bugs in need of fixing or may be enhanced with the addition of new features; many UNIX systems come with a package manager for this. Patching the operating system in a secure manner requires that the software come from a trustworthy source and not have been altered since it was packaged. Common methods for verifying that operating system patches have not been altered include the use of thedigital signature of acryptographic hash, such as aSHA-256 based checksum, or the use of read-only media.[citation needed]

Viruses and virus scanners

[edit]

There are viruses and worms that target Unix-like operating systems. In fact, the first computer worm—theMorris worm—targeted Unix systems.

There arevirus scanners for UNIX-like systems, frommultiple vendors.

Firewalls

[edit]

Network firewall protects systems and networks from network threats which exist on the opposite side of the firewall. Firewalls can block access to strictly internal services, unwanted users and in some cases filter network traffic by content.[citation needed]

iptables

[edit]
This section'sfactual accuracy may be compromised due to out-of-date information. The reason given is: Iptables is no longer the "current interface". Please help update this article to reflect recent events or newly available information.(January 2014)

iptables is the current user interface for interacting withLinux kernelnetfilter functionality. It replacedipchains. OtherUnix like operating systems may provide their own native functionality and otheropen source firewall products exist.

References

[edit]
  1. ^Levi, Bozidar (2002).UNIX Administration: A Comprehensive Sourcebook for Effective Systems and Network Management. CRC Press. p. 207.ISBN 0-8493-1351-1.

General

[edit]
  • Practical UNIX and Internet Security, Simson Garfinkel and Gene Spafford, O'Reilly & Associates, 2003.

External links

[edit]
Wikibooks has a book on the topic of:UNIX Computing Security
Wikiversity has learning resources aboutUnix security
Operating
systems
BSD
Linux
System V
Other
Compatibility
layers
Retrieved from "https://en.wikipedia.org/w/index.php?title=Unix_security&oldid=1273472496"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp