Windows and Linux Security Audit
نویسنده
چکیده
The security audit in operating system is necessary, especially when there are multiple users using it or when the system is part of a company’s network. Before heading into the security audit, you have to be aware of the fundamentals of IT security auditing, whose main objective is to assure protection of the information assets and to dispense information properly to authorized parties. In order to make the best choice when choosing an operating system and security is the most important factor, you have to know each operating system’ procedures for creating, logging and reporting of security audits. Finally, it is necessary to make a list comparing the most important security features of the operating systems and choosing the best solution based on it.
منابع مشابه
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
We present an approach and system for real-time reconstruction of attack scenarios on an enterprise host. To meet the scalability and real-time needs of the problem, we develop a platform-neutral, main-memory based, dependency graph abstraction of audit-log data. We then present efficient, tag-based techniques for attack detection and reconstruction, including source identification and impact a...
متن کاملAuditing overhead, auditing adaptation, and benchmark evaluation in Linux
Logging is a critical component of Linux auditing. However, our experiments indicate that the logging overhead can be significant. The paper aims to leverage the performance overhead introduced by Linux audit framework under various usage patterns. The study on the problem leads to an adaptive audit-logging mechanism. Many security incidents or other important events are often accompanied with ...
متن کاملAnalyzing the security of Windows 7 and Linux for cloud computing
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are...
متن کاملAccurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumentation. In this paper, we propose a Windows based audit logging technique that features accuracy and low cost. More importantly, it does not require instrumenting the applications, which is critical for commercial softwa...
متن کاملWindows and Linux Random Number Generation Process: A Comparative Analysis
In this paper, we explore and analyze the structure and functions of Random Number Generator (RNG) in Windows and Linux opreating systems. And compare the capabilities of their RNGs. It expected that this research would contribute to awareness of the quality and security of the random number generators implemented in Linux and Windows operating systems. It provides unbiased academic research in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012