1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
4 years ago
13

Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces

s whenever a program requests access to that file. the cops program scans a given system for possible security holes and alerts the user to possible problems. discuss the pros and cons of each program.
Computers and Technology
1 answer:
Cloud [144]4 years ago
5 0

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

You might be interested in
When presentations are being shown to an audience of over fifty people, how they should be displayed?
Anarel [89]
Full screeennn !!!!!!
6 0
4 years ago
Read 2 more answers
Which of the following is not a type of bank? (Everfi)
Zinaida [17]

Answer

Pay Day Lender

Explanation

A bank is a financial institution which is authorized by the government to accept deposits inform of cash or cheque from the public who are the customers, and it creates a credit. It saves money to for the customers and also provides security for the customers money. It also lends money to the customers as loan where they pay with interest within a given time. There are many types of banks which include credit unions, online banks,industrial, agricultural, retail banks and many others.

3 0
3 years ago
Read 2 more answers
If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will b
ahrayia [7]

Mapping to the IP address of the logged-in user<u>-will detect  a credential theft</u>

<u></u>

Explanation:

In the "Domain Credential Filter" method the firewall matches the username and the password submitted by the user with the corporate user id and password.

In order to match the credentials submitted by the user the firewalls retrieves data from the bloom filter which is further connected  to windows  User-ID credential service add-on.

The firewall also looks in its Mapping Table for the IP address of the logged-in user

3 0
3 years ago
You are running cable for a temporary network in a large auditorium. What is the maximum length you can have for the Ethernet ca
mote1985 [20]

It would be about 1K yards because it is a, as you stated<em> and</em> not to be rude, a large auditorium and 1K yards is the biggest number there.

4 0
3 years ago
Can u guys tell me what is the definition of umbra​
oksian1 [2.3K]

Answer:

the fully shaded inner region of a shadow cast by an opaque object, especially the area on the earth or moon experiencing the total phase of an eclipse.

Explanation:

i go.ogled it

5 0
3 years ago
Read 2 more answers
Other questions:
  • What does the "configure dhcp options for proxy dhcp" option do?
    13·1 answer
  • Diane wants to maintain a record of grades scored in the fifth, sixth, and seventh grades. She enters her grades and the total p
    13·1 answer
  • Although highly accurate navigational information from the GPS constellation is exploitable by adversary forces, it is unlikely
    5·1 answer
  • You coded the following class: public class N extends String, Integer { }When you compile, you get the following message:N.java:
    9·1 answer
  • What is an example of a memo
    9·1 answer
  • This is a python program.
    6·1 answer
  • 1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch
    5·1 answer
  • Which of these statements about tags is false?
    12·1 answer
  • Which button on a desktop computer begins a reboot of the computer without power being removed from the computer's components?
    5·1 answer
  • Your team at amazon is overseeing the design of a new high-efficiency data center at hq2. a power grid need to be generated for
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!