Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Design concepts  



1.1  Permissions  





1.2  User groups  





1.3  Root access  







2 User and administrative techniques  



2.1  Passwords  







3 Software maintenance  



3.1  Patching  







4 Viruses and virus scanners  





5 Firewalls  



5.1  iptables  







6 References  



6.1  General  







7 External links  














Unix security






Čeština
Slovenčina
Українська
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Unix security refers to the means of securingaUnixorUnix-like operating system.

Design concepts

[edit]

Permissions

[edit]

A core security feature in these systems is the file system permissions. All files in a typical Unix filesystem have permissions set enabling different access to a file. Unix permissions permit different users access to a file with different privilege (e.g., reading, writing, execution). Like users, different user groups have different permissions on a file.

User groups

[edit]

Many Unix implementations add an additional layer of security by requiring that a user be a member of the wheel user privileges group in order to access the su command.[1]

Root access

[edit]
Sudo command on Ubuntu to temporarily assume root privileges

Most Unix and Unix-like systems have an account or group which enables a user to exact complete control over the system, often known as a root account. If access to this account is gained by an unwanted user, this results in a complete breach of the system. A root account however is necessary for administrative purposes, and for the above security reasons the root account is seldom used for day to day purposes (the sudo program is more commonly used), so usage of the root account can be more closely monitored. [citation needed]

User and administrative techniques

[edit]

Passwords

[edit]

Selecting strong passwords and guarding them properly are important for Unix security. [citation needed]

On many UNIX systems, user and password information, if stored locally, can be found in the /etc/passwd and /etc/shadow file pair.

Software maintenance

[edit]

Patching

[edit]

Operating systems, like all software, may contain bugs in need of fixing or may be enhanced with the addition of new features; many UNIX systems come with a package manager for this. Patching the operating system in a secure manner requires that the software come from a trustworthy source and not have been altered since it was packaged. Common methods for verifying that operating system patches have not been altered include the use of the digital signature of a cryptographic hash, such as a SHA-256 based checksum, or the use of read-only media.[citation needed]

Viruses and virus scanners

[edit]

There are viruses and worms that target Unix-like operating systems. In fact, the first computer worm—the Morris worm—targeted Unix systems.

There are virus scanners for UNIX-like systems, from multiple vendors.

Firewalls

[edit]

Network firewall protects systems and networks from network threats which exist on the opposite side of the firewall. Firewalls can block access to strictly internal services, unwanted users and in some cases filter network traffic by content.[citation needed]

iptables

[edit]

iptables is the current user interface for interacting with Linux kernel netfilter functionality. It replaced ipchains. Other Unix like operating systems may provide their own native functionality and other open source firewall products exist.

References

[edit]
  1. ^ Levi, Bozidar (2002). UNIX Administration: A Comprehensive Sourcebook for Effective Systems and Network Management. CRC Press. p. 207. ISBN 0-8493-1351-1.

General

[edit]
[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Unix_security&oldid=1219087313"

Categories: 
Operating system security
System administration
Unix
Linux administration
Linux security software
Hidden categories: 
Articles needing additional references from April 2024
All articles needing additional references
Articles lacking in-text citations from April 2024
All articles lacking in-text citations
Articles needing additional references from September 2014
Articles with multiple maintenance issues
All articles with unsourced statements
Articles with unsourced statements from April 2024
Articles with obsolete information from January 2014
All Wikipedia articles in need of updating
Webarchive template wayback links
 



This page was last edited on 15 April 2024, at 17:36 (UTC).

Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



Privacy policy

About Wikipedia

Disclaimers

Contact Wikipedia

Code of Conduct

Developers

Statistics

Cookie statement

Mobile view



Wikimedia Foundation
Powered by MediaWiki