Internal and External Threats

Most of the security tools and technologies covered in this book are designed to defend a system or organization from various threats and attacks that are external to the system or organization. Password authentication, encryption, firewalls, and so on are all examples of techniques to prevent unauthorized access by outsiders. However, as soon as they all have been successfully passed, when the intruder is in the system and has all the rights and privileges of a particular user (or the superuser, in the worst case), there is little to stop him. In extreme cases, the data and/or applications are just too important, and the traditional discretionary access control model provided by UNIX is not enough. Furthermore, ...

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.