UNIX™ System Security

Patrick H. Wood, Stephen G. Kochan

Publisher: Hayden, 1985, 299 pages

ISBN: 0-8104-6267-2

Keywords: IT Security

Last modified: June 6, 2021, 1:06 p.m.

Here is a practical guide to computer security on the UNIX system for the user, administrator, or potential UNIX system buyer. It will teach you everything you need to know to make your system secure and keep it that way. Topics covered include:

  • file and directory permissions
  • password security
  • how the setuid/gid permissions work and how to use them
  • how the various security-related UNIX commands and functions work
  • how to write secure programs
  • different methods of data encryption — including the government-standard DES algorithm — and how secure they are
  • data encryption over communication networks
  • how to discover and plug potential security holes in your system
  • how to periodically monitor your system to maintain security

Also included is the complete source for several security auditing and administration programs.

  1. Introduction
  2. A Perspective on Security
  3. Security for Users
    • Password Security
    • File Permissions
    • The Set User Id and Set Group Id Permissions
    • cp, mv, ln, and cpio
    • The su and newgrp Commands
    • File Encryption
    • Miscellaneous Security Topics
    • Keeping Your Login Secure
    • References
  4. Security for Programmers
    • System Routines
    • The Standard C Library
    • Writing Secure C Programs
    • Programming as root
    • References
  5. Security for Administrators
    • Security Administrators
    • The Super-User
    • File System Security
    • Programs That Are Run as root
    • /etc/passwd
    • /etc/group
    • Adding, Removing, and Moving Users
    • Security Auditing
    • Restricted Environments
    • Small System Security
    • Physical Security
    • User Awareness
    • Administrator Awareness
  6. Network Security
    • An Overview of the UUCP System
    • Security Considerations for UUCP
    • HONEYDANBER UUCP
    • Other Networks
    • Secure Communications
    • References
  1. References
  2. Security Commands and Functions
  3. Permissions
  4. Security Auditing program
  5. File Permission Program
  6. Password Administration Program
  7. Password Expiration Program
  8. Terminal Securing Program
  9. SUID/SGID Shell Execution Program
  10. Restricted Environment Program
  11. DES Encryption Program
  12. SUID Patent
  13. Glossary

Reviews

UNIX™ System Security

Reviewed by Roland Buresund

OK ***** (5 out of 10)

Last modified: May 21, 2007, 2:51 a.m.

My first security book. Has today only sentimental and historical value.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required