Beuchelt, 2017 - Google Patents
UNIX and Linux securityBeuchelt, 2017
- Document ID
- 13459020837903790649
- Author
- Beuchelt G
- Publication year
- Publication venue
- Computer and information security handbook
External Links
Snippet
There are many objectives and goals to be considered when securing a UNIX operating system. When configuring UNIX operating system security, consider these critical principals of security, known as the confidentiality, integrity, and availability (CIA) triad. In addition to …
- 238000000034 method 0 description 57
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11846975B2 (en) | Distributed security analysis for shared content | |
US12010248B2 (en) | Systems and methods for providing authentication to a plurality of devices | |
US8909930B2 (en) | External reference monitor | |
Souppaya et al. | Guide to enterprise telework, remote access, and bring your own device (BYOD) security | |
EP2792104A1 (en) | Automated access, key, certificate, and credential management | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
Marshall et al. | Security best practices for developing windows azure applications | |
Cordis et al. | Considerations in mitigating Kerberos vulnerabilities for active directory | |
Hicks et al. | An architecture for enforcing end-to-end access control over web applications | |
Moodie | Pro Apache Tomcat 6 | |
US11757934B1 (en) | Extended browser monitoring inbound connection requests for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links | |
Beuchelt | UNIX and Linux security | |
US11695799B1 (en) | System and method for secure user access and agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links | |
Kyriakou | Infrastructure Penetration Testing | |
Scarfone et al. | Guide to enterprise telework and remote access security | |
Pavelka et al. | Practical Aspects of Attacks Against Remote MS Windows Corporate Environment | |
Gkotsis | Creating a windows active directory lab and performing simulated attacks | |
US11711396B1 (en) | Extended enterprise browser blocking spread of ransomware from alternate browsers in a system providing agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links | |
US11757933B1 (en) | System and method for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links | |
Tank et al. | Security analysis of OpenStack keystone | |
Mohammad Ali Pour | Red Team Interview Questions | |
Foltz et al. | Enterprise Security with Endpoint Agents | |
Souppaya et al. | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist | |
Ridgway | Security best practices for windows azure solutions | |
Neagu | Oracle 11g Anti-hacker's Cookbook |