O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Internal and External Threats

Most of the security tools and technologies covered in this book are designed to defend a system or organization from various threats and attacks that are external to the system or organization. Password authentication, encryption, firewalls, and so on are all examples of techniques to prevent unauthorized access by outsiders. However, as soon as they all have been successfully passed, when the intruder is in the system and has all the rights and privileges of a particular user (or the superuser, in the worst case), there is little to stop him. In extreme cases, the data and/or applications are just too important, and the traditional discretionary access control model provided by UNIX is not enough. Furthermore, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required