Article Preview
Top1. Introduction
The increased applications of business, technology, resources & communications system by IT industries has increased the risk of theft of proprietary information. The real time operating system control & audit is a primary method of protecting system resources (Processor, Memory & Encryption Key). The system control is probably the most important aspect of communications security and becoming increasingly important as basic building block for information security. The control is inversely proportional to the Risk & mean while control is directly proportional to the quality of standard(S) (Gupta, 2012). The control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the anti-symmetric model for risk mitigation on large scale Unix operating system based on available product, business & resources (Das, 2009; O’Reilly, 1995; Kai, 2008; Sun-Microsystem, 2002; Tanenbaum,2010).
The real operating system (server system) in large scale has even greater responsibilities and powers for large scale business like web based and mobile computing. It is just like a traffic management system and makes sure that different programs and software packages the users and clients running at the same time do not interfere with each other. The operating system is also responsible for risk and security ensuring that unauthorized users do not access the system (Das, 2009; O’Reilly, 1995; Kai, 2008; Sun-Microsystem, 2002; Tanenbaum,2010).
To assess effectively the security needs of an organization to evaluate and choose various security products and policies, the authority is responsible for security needs some systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. This is difficult enough in a centralized data processing environment; with the use of local and wide area networks, the problems are compounded. The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as Security attacks: any action that compromises the security of information owned by an organization. Security mechanism: A process that is designed to detect, prevent, or correct from any security attack. Security services: A processing or communication services that enhances the security of the data processing systems and the information transfer of an organization. The services are intended to encounter security attacks and they make use of one or more security mechanisms to provide the services (Ron, 2002; Stalling, 2006; Schneier, 1996)