According to the security requirements of the UNIX host , in this article the information security technology of the UNIX host on a trusted environment is discussed. The security vulnerabilities, threats and risks for UNIX systems are analyzed. An UNIX host's security policy and an adaptive security management model are proposed. Some technologies of the RSBAC, HIDS and security audit are also discussed. And finally, the host security monitor & management software blueprint is given.
|