Common Unix Attacks and Defenses

Common Unix Attacks and Defenses

Copyright(c) Management Analytics, 1995 - All Rights Reserved

Copyright(c), 1990, 1995 Dr. Frederick B. Cohen - All Rights Reserved

Although designing secure systems normally requires that we take protection into consideration through the entire design process, systems administrators must deal with the security issues of the system they are using, regardless of the design and implementation flaws that come with the system. For that reason, we will now list many of the most commonly exploited pitfalls of UNIX and discuss how to defend against them.