The Last Line of Defense

Author(s):  
Art Taylor

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but evidence suggests that the computer server and its operating system deserve closer examination since it is ultimately the operating system and its core defense mechanisms of authentication and authorization which are compromised in an attack. This chapter provides an exploratory and evaluative discussion of the authentication and authorization features of two widely used server operating systems: Windows and Linux.

Author(s):  
Art Taylor

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but evidence suggests that the computer server and its operating system deserve closer examination since it is ultimately the operating system and its core defense mechanisms of authentication and authorization which are compromised in an attack. This chapter provides an exploratory and evaluative discussion of the authentication and authorization features of two widely used server operating systems: Windows and Linux.


Author(s):  
Art Taylor ◽  
Lauren Eder

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but it is ultimately the computer operating system that is compromised as a result of these attacks. The computer operating system represents the last line of defense in our security chain. This final layer of defense and its core defense mechanisms of authentication, authorization, and auditing deserve closer scrutiny and review. This chapter will provide an exploratory, descriptive, and evaluative discussion of these security features in the widely used Windows and Linux operating systems.


Author(s):  
Art Taylor ◽  
Lauren Eder

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but it is ultimately the computer operating system that is compromised as a result of these attacks. The computer operating system represents the last line of defense in our security chain. This final layer of defense and its core defense mechanisms of authentication, authorization, and auditing deserve closer scrutiny and review. This chapter will provide an exploratory, descriptive, and evaluative discussion of these security features in the widely used Windows and Linux operating systems.


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


Author(s):  
Nijaz Bajgoric

Chapter IX focuses on the role of system administration as an IT-profession and system administrator as a person who does the administrative (managerial) activites on servers and server operating systems. If server goes down for any reason or server operating system crashes, in most cases it is up to this person to “recover” the server from the bad situation and make sure that business – critical applications continue to run and provide services to end users. HP-UX as a server operating system platform is selected in order to demonstrate most commonly used techniques and features that may lead to higher levels of system availability.


Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


Author(s):  
Gayathri RajaKumaran ◽  
NeelaNarayanan Venkataraman

In the Internet Era, millions of computer systems are connected to the Internet and the number is increasing infinitely. Maintaining proper Control and configuration for all such networked systems has proved to be impossible. This loophole makes the Internet systems vulnerable to various type of attacks. The objective of this research is to systematically identify a wide list of attacks in transport, session and application layers (Host layers). 148 effective controls are identified for the security attacks in addition to the 113 standard controls. The identified controls are analyzed in order to map and categorize them to the corresponding security layers wise.


2018 ◽  
pp. 468-491
Author(s):  
Fahmi Ncibi ◽  
Habib Hamam ◽  
Ezzedine Ben Braiek

In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.


Author(s):  
Zoltan Czirkos ◽  
Gabor Hosszú

The importance of the network security problems comes into prominence with the growth of the Internet. This article presents a special approach to the intrusion detection (ID) problem, which relies on the collaboration of the protection programs running on different hosts. Computers connected to networks are to be protected by various means (Kemmerer & Vigna, 2002). The collaboration of the elements of the proposed intrusion detection system uses the so-called peer-to-peer (P2P) communication model. The article first presents the usage of the P2P paradigm for improving the protection of the operating systems (Bauer, 2005).


Sign in / Sign up

Export Citation Format

Share Document