Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 28: User Security

Similar presentations


Presentation on theme: "Chapter 28: User Security"— Presentation transcript:

1 Chapter 28: User Security
Dr. Wayne Summers Department of Computer Science Columbus State University

2 Policy U1 - Only users have access to their accounts
U2 - No other user can read / change a file without the owner’s permission U3 - Users shall protect the integrity, confidentiality, and availability of their files U4 - Users shall be aware of all commands that they enter, or that are entered on their behalf

3 Access Passwords Generate random passwords where possible
Keep passwords secure Use proactive password checking program Login Procedure Trusted hosts Leaving System Screen locking program

4 Files and Devices Files File Permissions on Creation (use templates)
Group Access (default deny) File Deletion (aliases, persistence) Devices Writeable Devices Smart Terminals Monitors and Window Systems

5 Processes Copying & Moving Files (different permissions)
Accidentally Overwriting Files (confirmation) Encryption, Cryptographic Keys, and Passwords .netrc file for ftp Start-up Settings (trust start-up info) Limited Privileges Malicious Logic search path: should include only trusted directories

6 Electronic Communications
Automated Electronic Mail Processing Execution of attachments Failure to Check Certificates Sending unexpected content Attachments to


Download ppt "Chapter 28: User Security"

Similar presentations


Ads by Google