Download presentation
Presentation is loading. Please wait.
1
Chapter 28: User Security
Dr. Wayne Summers Department of Computer Science Columbus State University
2
Policy U1 - Only users have access to their accounts
U2 - No other user can read / change a file without the owner’s permission U3 - Users shall protect the integrity, confidentiality, and availability of their files U4 - Users shall be aware of all commands that they enter, or that are entered on their behalf
3
Access Passwords Generate random passwords where possible
Keep passwords secure Use proactive password checking program Login Procedure Trusted hosts Leaving System Screen locking program
4
Files and Devices Files File Permissions on Creation (use templates)
Group Access (default deny) File Deletion (aliases, persistence) Devices Writeable Devices Smart Terminals Monitors and Window Systems
5
Processes Copying & Moving Files (different permissions)
Accidentally Overwriting Files (confirmation) Encryption, Cryptographic Keys, and Passwords .netrc file for ftp Start-up Settings (trust start-up info) Limited Privileges Malicious Logic search path: should include only trusted directories
6
Electronic Communications
Automated Electronic Mail Processing Execution of attachments Failure to Check Certificates Sending unexpected content Attachments to
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.