A Literature Survey on Risk Assessment for Unix Operating System

Author(s):  
Padma Lochan Pradhan

This proposed literature survey provides basic data regarding the first step of risk identification and analysis to achieve a secured infrastructure. The demand and risk are two parts of the same coin. The demand is directly proportional to the risk, but preventive control is inversely proportional to risk. The necessity of preventive control in any organization has increased because of the changes in logic, structure, and the type of technology applied to services that generate risks. Finally, the business increases along with technology, which creates risks and spreads over its infrastructure. We have to focus on protecting, detecting, correcting, verifying and validating the Unix file system. This survey article proposes and resolves the Unix file system by applying a hardening, re-configuration and access control mechanism up to the highest level of preventive control.

Author(s):  
Prashant Kumar Patra ◽  
Padma Lochan Pradhan

Control and risk are the two parts of the coin. Risk assessment is the process of identifying uncertainties, vulnerabilities and threats to the operating system resources in order to achieve business objectives. Risk evaluation involved deciding what counter measures to take in reducing uncertainty to the lowest level of risk. Control is probably the most important aspect of communications security and becoming increasingly important as basic building block for system security. Advanced Encryption Standard (AES) is a primary method of protecting system resources. AES is inversely proportional to the Risk (C=K/R) & mean while control is directly proportional to the quality of standard. AES Control will be optimize the risk as well as improve the IS standard. Control is directly proportional to risk mitigation & mitigation is directly proportional to standard. This paper contributes to the development of an optimization method that aims to determine the optimal cost to be invested into security method, model & mechanisms deciding on the measure component of operating system resources (i.e. Processor, Memory & Encryption). Furthermore, the method & mechanism optimize the cost, time & resources is supposed to optimize the system risks. The proposed model would be update the value of Processor, Memory & Encryption key dynamically as per business requirement and availability of technology & resources. Proposed model is going to be optimizing risk and maximizing the performance. In this study the researchers develop an isomorphic graph model for optimizing risk in the Unix operating system.


2013 ◽  
Vol 380-384 ◽  
pp. 2200-2203
Author(s):  
Hong Wang

Linux is a comparatively safe operating system. This paper makes a research about the security policy for Linux, analyzing the principle and design idea of its identification and authentication mechanism, access control mechanism, Capability mechanism and security audit system. In this paper, the disadvantages of Linux system are pointed out and an improvement program is indicated so that the security performance of this system can be more effectively strengthened.


Author(s):  
Prashant Kumar Patra ◽  
Padma Lochan Pradhan

The preventive control is the one of the best and well advanced control in all aspects of day to day life. The prevention afforded to an automated system control system in order to attain the highest applicable objectives of preserving the confidentiality, integrity and high availability of information system resources (including hardware, system software, firmware, processor, memory and data).The risk assessment is the process of identifying vulnerabilities and threats to operating system resources to achieving highest business objectives and deciding what counter measures to take in reducing the lowest level of risk. The proposed RFOS model and mechanism provides accountability for individuals who are accessing sensitive information on application, system software, server and network. This accountability is accomplished through access control mechanisms that require Confidentiality, Integrity, Authentication, Access control, Non repudiation, Availability and Privacy through operating system audit function. We have to develop the dynamic RFOS model for risk optimization process on operating system. This paper contributes to the development of an optimization mechanism that aims to determine the optimal cost to be invested into security model and mechanisms deciding on the measure component of operating system resources (i.e. Processor, Memory, File System, Kernel). Furthermore, this algebraic model and mechanism optimize the cost, time and resources is supposed to optimize the system risks. The control is inversely proportional to the risk and control is directly proportional to the standard. In this research paper, we are proposing integrated, hierarchical and dynamic way of Relation, Function, Operation and Services Model for optimizing the risk on the real time operating system. Preventive Control is inversely proportional to the Risk and directly proportional to the Quality.


2013 ◽  
Vol 2 (3) ◽  
pp. 49-62
Author(s):  
Prashant Kumar Patra ◽  
Padma Lochan Pradhan

Control and risk are the two parts of the coin. Risk assessment is the process of identifying uncertainties, vulnerabilities and threats to the operating system resources in order to achieve business objectives. Risk evaluation involved deciding what counter measures to take in reducing uncertainty to the lowest level of risk. Control is probably the most important aspect of communications security and becoming increasingly important as basic building block for system security. Advanced Encryption Standard (AES) is a primary method of protecting system resources. AES is inversely proportional to the Risk (C=K/R) & mean while control is directly proportional to the quality of standard. AES Control will be optimize the risk as well as improve the IS standard. Control is directly proportional to risk mitigation & mitigation is directly proportional to standard. This paper contributes to the development of an optimization method that aims to determine the optimal cost to be invested into security method, model & mechanisms deciding on the measure component of operating system resources (i.e. Processor, Memory & Encryption). Furthermore, the method & mechanism optimize the cost, time & resources is supposed to optimize the system risks. The proposed model would be update the value of Processor, Memory & Encryption key dynamically as per business requirement and availability of technology & resources. Proposed model is going to be optimizing risk and maximizing the performance. In this study the researchers develop an isomorphic graph model for optimizing risk in the Unix operating system.


Sign in / Sign up

Export Citation Format

Share Document