Unix Security

  • John M. D. Hunter
Part of the Computer Communications and Networks book series (CCN)


The original design for Unix did not have security issues as a first priority. It was intended as an environment for the rapid and efficient development of software. Purely fortuitously, Unix had a number of features which could be adapted to provide some security. All the comments about Unix security weaknesses apply equally to Linux.


Group Account Access Control Mechanism Unauthorised User Shell Script Unix System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London 2001

Authors and Affiliations

  • John M. D. Hunter
    • 1
  1. 1.CISM GroupCranfield University, RMCSShrivenham, SwindonUK

Personalised recommendations