Unix Security Principles
Unix Security Principles
6- Separation of Privilege: two examples validate this principle in Unix that are:
- On BSD systems, su users must belong to the wheel group and know the
root password (Written in the course).
- Unix Ad-hoc privilege separation (you can read about it to take a general
overview)
7- Principle of Least Common Mechanism: the example of virtual machines in
the course.
8- Psychological Acceptability: the ssh program allows a user to set up a public
key mechanism for enciphering communications between systems. The
installation and configuration mechanisms for the UNIX version allow one to
arrange that the public key be stored locally without any password protection.
In this case, one need not supply a password to connect to the remote system,
but will still obtain the enciphered connection. This mechanism satisfies the
principle of psychological acceptability (This example is mentioned in the
course).