A Literature Survey on Risk Assessment for Unix Operating System: Risk Assessment on UNIX OS

A Literature Survey on Risk Assessment for Unix Operating System: Risk Assessment on UNIX OS

Padma Lochan Pradhan (Sritech New Raipur, Raipur, India)
DOI: 10.4018/IJAPUC.2019070102

Abstract

This proposed literature survey provides basic data regarding the first step of risk identification and analysis to achieve a secured infrastructure. The demand and risk are two parts of the same coin. The demand is directly proportional to the risk, but preventive control is inversely proportional to risk. The necessity of preventive control in any organization has increased because of the changes in logic, structure, and the type of technology applied to services that generate risks. Finally, the business increases along with technology, which creates risks and spreads over its infrastructure. We have to focus on protecting, detecting, correcting, verifying and validating the Unix file system. This survey article proposes and resolves the Unix file system by applying a hardening, re-configuration and access control mechanism up to the highest level of preventive control.
Article Preview
Top

2. Goal Of Literature Survey

There is a thorough review of the literature was conducted with the primary goal of determining the risk assessment on the Unix operating system for IT infrastructure on the large electronic workplace. This research has been conducted on real-time Unix file systems applying hardening, re-configuration, access control mechanism and system programming as per the demand of complex Business, Technology & Resources (Dario, 2009; Denis, 2003; Debi, 2008).

Now a day, Information security and services is the most important and well advanced to any Information Technology organization. The literature defines information security as a set of process, procedures, policy, personnel, business and technology charged with property on organization into assets (technology) (Dieter, 2008). It is also can be defined as the prevention, detection, correction, and recovery from unauthorized or undesirable destruction, modification, disclosure or use of information and resources (Ron, 2002). The necessity of information security in any organization has increased because of the enormous changes in structure and type of information technology applied to information creates risks. Finally, the business increases along with technology, which generates risks as well as vulnerabilities (Schofield, 2005).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing