Volume : I, Issue : VII, December - 2012

Server Access Control

Anitha Chepuru, Dr. K. Venugopal Rao, Amardeep Matta

Abstract :

This paper describes the concepts centralized security policies by which we can provide a total security solution for open native operating systems. Today every organization requires high level protection against external threats and internal user activities. Organizations face a number of critical requirements for access control for their resources. All organizations are under increasing pressure to be more competitive and compliant. As key business enabler, must protect all their critical applications. As all critical applications and sensitive data reside with Operating System, effective management and enforcement of OS access is of paramount importance. Disclosure rules should be implemented and enforced consistently across to help protect data. This can be particularly challenging as today’s organizations infrastructure invariably support a number of heterogeneous operating systems. For authentication and user management, UNIX / Linux systems provide native local account management capability which again very costly to administer. While another method Network information service (NIS) provides a centralized approach for authentication but it has its own significant security issues. This Server Access Control (SAC) for operating system solution provides centralized authentication, password management, high scalability, availability, security and account management for critical servers..This access control solution will help organization securely manage access to business critical servers / operating systems by giving users proper access they need. • Defends against the top security threat that enterprises face: malicious or fraudulent behavior by internal users and employees • Combines full-fledged intrusion prevention-host-based firewall, application and platform protection, user tracking and controlswith robust auditing and compliance checking • Provides Persistent Universal Auditing to document compliance with government regulations, corporate policy and other security mandates • Provides best-practice security policy templates to minimize implementation effort and time • Delivers mainframe-class security and auditing in a lightweight, easy-to-use.

Keywords :

Article: Download PDF   DOI : 10.36106/ijsr  

Cite This Article:

Anitha Chepuru, Dr.K.Venugopal Rao, Amardeep Matta Server Access Control International Journal of Scientific Research, Vol.I, Issue.VII Dec 2012


Number of Downloads : 530


References :