1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
4 years ago
13

Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces

s whenever a program requests access to that file. the cops program scans a given system for possible security holes and alerts the user to possible problems. discuss the pros and cons of each program.
Computers and Technology
1 answer:
Cloud [144]4 years ago
5 0

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

You might be interested in
The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric devic
Eduardwww [97]

Answer: Rate

Explanation:

  • Rate is the one that is used to describe the number of legitimate users who are denied access because there is a failure happening in the biometric device and that type of failure is also known as Type I Error.

When it comes to hypothesis testing we can say that this kind of error is considering the rejection of the null hypothesis. On the other side, there is also Type II Error who is not rejecting the false null hypothesis and it is the opposite of a Type I Error.

4 0
3 years ago
Information technology student Roberta has been assigned a project on how to detect unwanted outgoing attacks. Which step is par
tino4ka555 [31]

The attacks from the malware and the viruses to the system are considered as the unwanted attacks. These attacks detection can be performed by ensuring whether the system responds to port 443 by initiating Apache.

<h3>What is the function of port 443?</h3>

The port 443 in the computer system is the virtual port that functions with the diversion of the network. The presence of the unwanted attack blocks the response of the port 443.

Therefore, to detect the attack, the response of the system to port 443 with the starting of Apache must be checked.

Learn more about port 443, here:

brainly.com/question/13140343

#SPJ1

5 0
2 years ago
Rina has misspelled a word many times in her document. Which is the fastest way she can correct the mistake?
kati45 [8]
A) Use the replace all button
5 0
4 years ago
What is the first thing Kernel does when WinLoad turns over the starttup process to it
SashulF [63]

It activates HAL, reads more information from the registry, and builds into memory the registry key

4 0
3 years ago
Write C code for a getCommonNeighbors function that accepts two vertex struct pointers, u and v, and returns unordered_set conta
LenaWriter [7]

Answer:

Hi how are you doing today Jasmine

8 0
3 years ago
Other questions:
  • "a router interface has been assigned an ip address of 172.16.192.166 with a mask of 255.255.255.252. to which subnet does the i
    5·1 answer
  • Needed urgently what are short cut keys
    8·2 answers
  • To quickly jump to the last cell in a worksheet press ____.
    15·1 answer
  • When you cut and then paste a file, what are you doing?
    7·2 answers
  • Which programming language was released first
    7·1 answer
  • I love this an this a a good app ❤️❤️❤️​
    5·2 answers
  • Antivirus is a program that detects error.True or False.​
    9·1 answer
  • Fill in the blank to complete the sentence.
    8·1 answer
  • Create a defined name for range b6:e6 using walkup as the range name
    9·1 answer
  • What is a "Top-Level Domain Name"?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!