Taylor, 2002 - Google Patents
Practical Unix Security-Securing IBM's AIX.Taylor, 2002
View PDF- Document ID
- 4669697775461360400
- Author
- Taylor S
- Publication year
- Publication venue
- ISSA
External Links
Snippet
This paper describes the process involved in securing a computer running AIX-IBM's version of unix. AIX is derived from the BSD and System V variants of unix, with the addition of a system and device configuration database-the ODM1. This has led to the creation of a large …
- 241000272519 Aix 0 title abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lippmann et al. | The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection | |
| Binde et al. | Assessing outbound traffic to uncover advanced persistent threat | |
| US7509675B2 (en) | Non-invasive monitoring of the effectiveness of electronic security services | |
| Kim et al. | DSS for computer security incident response applying CBR and collaborative response | |
| Kurundkar et al. | Network intrusion detection using Snort | |
| Jha et al. | Building agents for rule-based intrusion detection system | |
| Binnie | Linux Server security: hack and defend | |
| Taylor | Practical Unix Security-Securing IBM's AIX. | |
| Lukatsky et al. | Protect your information with intrusion detection | |
| Noureldien et al. | On firewalls evaluation criteria | |
| Wilson | Hacking: the basics | |
| Dunigan et al. | Intrusion detection and intrusion prevention on a large network: A case study | |
| Harrison et al. | A protocol layer survey of network security | |
| Thomas et al. | Bot countermeasures | |
| Sarvepalli | Designing Network Security Labs | |
| Edge et al. | Network scanning, intrusion detection, and intrusion prevention tools | |
| Lytle et al. | Security in the residential network | |
| Allen et al. | Detecting Signs of Intrusion | |
| Mohammed | Cybercafé Systems Security | |
| Asarcıklı | Firewall monitoring using intrusion detection systems | |
| Ashe | A vulnerability assessment of the East Tennessee State University administrative computer network | |
| Drozdova | Securing a dns server with snort ids: severen-telecom case | |
| Saoutine | Barbarians at the Gate | |
| Hudson | An analysis of botnet vulnerabilities | |
| Brenton et al. | Top 5 essential log reports |