Content deleted Content added
MüllerMarcus (talk | contribs) m →Root access: yeah, superman is not a helpful concept in an encyclopedic article on superuser privileges. |
Spam - Undid revision 1273468989 by 73.180.167.130 (talk) |
||
(23 intermediate revisions by 9 users not shown) | |||
Line 1:
{{Multiple issues|
{{One source|date=April 2024}}
{{More footnotes needed|date=April 2024}}
}}
'''Unix security''' refers to the means of [[Computer security|securing]] a [[Unix]] or [[Unix-like]] [[operating system]].
Line 5 ⟶ 8:
===Permissions===
{{Main|File system permissions}}
A core security feature in these systems is the [[file system permissions]]. All files in a typical [[Unix filesystem]] have permissions set enabling different access to a file. [[Unix permissions]] permit different users access to a file with different privilege (e.g., reading, writing, execution). Like users, different ''user groups'' have different permissions on a file.
===User groups===
Line 22 ⟶ 24:
Selecting strong [[Password|passwords]] and guarding them properly are important for Unix security. {{Citation needed|date=April 2024}}
On many UNIX systems, user and password information, if stored locally, can be found in the [[Passwd|<code>/etc/passwd</code>]] and <code>/etc/shadow</code> file pair.
==Software maintenance==
===Patching===
Operating systems, like all software, may contain bugs in need of fixing or may be enhanced with the addition of new features; many UNIX systems come with a package manager for this. Patching the operating system in a secure manner requires that the software come from a trustworthy source and not have been altered since it was packaged. Common methods for verifying that operating system patches have not been altered include the use of the [[digital signature]] of a [[cryptographic hash]], such as a [[SHA-2|SHA-256]] based checksum, or the use of read-only media.{{Citation needed|date=April 2024}}
==Viruses and virus scanners==
There are viruses and worms that target Unix-like operating systems. In fact, the first computer worm—the [[Morris worm]]—targeted Unix systems.
There are [[Antivirus software|virus scanners]] for UNIX-like systems, from [[Comparison_of_antivirus_software|multiple vendors]].
==Firewalls==<!-- This section is linked from [[Unix security]] -->
[[Network firewall]] protects systems and networks from network threats which exist on the opposite side of the firewall. Firewalls can block access to strictly internal services, unwanted users and in some cases filter network traffic by content.{{Citation needed|date=April 2024}}
===iptables===
{{Update section|date=January 2014|reason=Iptables is no longer the "current interface"|inaccurate=yes}}
[[iptables]] is the current user interface for interacting with [[Linux]] kernel [[netfilter]] functionality. It replaced [[ipchains]]. Other [[Unix]] like operating systems may provide their own native functionality and other [[open source]] firewall products exist.
==References==
|