Summary and opinions of Multiple resources, computer science assignment help

User Generated

kzux0k

Computer Science

Description

5 sources, short summary for each source, with opinions

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hello, I have completed your assignment. Goodbye and welcome again

Running head: PLUGGABLE AUTHENTICATION MODULE

Operating System Security and PAM (Pluggable Authentication Module)
Student’s Name
Name of the Institution

1

PLUGGABLE AUTHENTICATION MODULE

2

Operating System Security and PAM (Pluggable Authentication Module)
Zaharia, A. (2016). The 13 Step Guide to Secure Your PC After a Fresh Windows
Installation [Updated]. Heimdal Security Blog. Retrieved 20 September 2016, from
https://heimdalsecurity.com/blog/fresh-windows-installation-security-guide/

The author suggests that people should maintain their operating system dated by installing the
latest security updates and patches for their operating system. Using a standard user account
to access a personal computer is important as it is always preventing users from making
choices that could affect other people using the computer.
Being careful online is another critical aspect. The author advises users to hover the mouse
over the link to see if they are directed to a legitimate location. Also, tools such as redirect
detective can be used to show complete path of a redirected link.
Since hackers are getting better as they try to get into user’s space, it is important to focus on
the fight against cybercrime.

How PAM works | TuxRadar Linux. (2016). Tuxradar.com. Retrieved 20
September 2016, from http://www.tuxradar.com/content/how-pam-works
PAM (pluggable authentication module) is a framework that assists other application in
authentication-related activities. It allows the administrator to add new authentication method
by simply adding new modules.
PAM recognises four kinds of authentication activity namely:
Account – to allow users to login to an account
Allocates – the resources required by the user during the login session.
Auth – the activity of proving who the user is by providing valid credentials
Password to update user credentials.
PAM works with programs that need to authenticate users which are Login and GDM.
PAM revolves around authentication meaning that only members with valid credentials gain
access. This prevents illegal or unaut...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags