ABSTRACT

The connectivity provided between most UNIX systems requires special attention to protect against inappropriate remote system access and UNIX- to-UNIX copy protocol access. Attempts to crack passwords and continual discoveries of new ways to compromise UNIX systems are constant reminders of the time and energy many are willing to expend to gain access to UNIX systems. Security to UNIX systems is also affected by the dramatic increase in their numbers at most corporations and the corresponding push for sysadmins to manage larger numbers of processors. This added responsibility may result in a large decline in the amount of time sysadmins allocate to system security. This provides tremendous reason for auditors to review their companies’ UNIX environments.