1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
13

Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces

s whenever a program requests access to that file. the cops program scans a given system for possible security holes and alerts the user to possible problems. discuss the pros and cons of each program.
Computers and Technology
1 answer:
Cloud [144]3 years ago
5 0

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

You might be interested in
When web developers specify color values for text or backgrounds, they often represent RGB (red-green-blue) colors using a six-d
neonofarm [45]

Answer: A #3f107f.

Letter B would produce a lighter blue-purple color rather than a darker shade of purple. Letter C would produce a very light purple color. Letter D would produce a Black color, making it very dark and not in the range of being purple.

Letter A would produce a darker shade of purple. As explained in the way that the RGB color hexadecimal uses, the amount of each respective color is 2 digits for each color Red, Green, Blue respectively.  By reducing the amount of each color in the RGB mode, the output will become a darker shade as the RGB mode is an ADDITITIVE type of color mode.

7 0
3 years ago
If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page
Mariulka [41]

Answer:

Explanation:

If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page the last word on a page.

7 0
3 years ago
Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?
muminat

Answer: I think it’s D

Explanation: the rest apply to the the rules of 1NF and 2NF

5 0
2 years ago
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for
Pavel [41]
In Encryption - ........
7 0
3 years ago
Which kind of image is indispensable and needs added text to go with it
grigory [225]
It may be an image that is on the internet, without a caption visually impaired will not understand
7 0
3 years ago
Other questions:
  • .exe, .msi, .msp, .inf - together, what do these filetypes indicate
    12·2 answers
  • Write a Console Java program that asks the user to enter one sentence on the keyboard. Output on the console:
    6·1 answer
  • When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of yo
    12·1 answer
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • Which renewable resources are available at any time?​
    15·1 answer
  • What is the maximum current that should be allowed in a 5.0w 220 resistor?
    12·1 answer
  • A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
    9·1 answer
  • Reading a news release about a product is an example of <br> research.
    9·1 answer
  • For C++ ONLY please,
    14·1 answer
  • What is it called when servers on the Internet supply applications as a service, rather than a product
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!