Article Preview
Top2. Goal Of Literature Survey
There is a thorough review of the literature was conducted with the primary goal of determining the risk assessment on the Unix operating system for IT infrastructure on the large electronic workplace. This research has been conducted on real-time Unix file systems applying hardening, re-configuration, access control mechanism and system programming as per the demand of complex Business, Technology & Resources (Dario, 2009; Denis, 2003; Debi, 2008).
Now a day, Information security and services is the most important and well advanced to any Information Technology organization. The literature defines information security as a set of process, procedures, policy, personnel, business and technology charged with property on organization into assets (technology) (Dieter, 2008). It is also can be defined as the prevention, detection, correction, and recovery from unauthorized or undesirable destruction, modification, disclosure or use of information and resources (Ron, 2002). The necessity of information security in any organization has increased because of the enormous changes in structure and type of information technology applied to information creates risks. Finally, the business increases along with technology, which generates risks as well as vulnerabilities (Schofield, 2005).