Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Privilege separation

Index Privilege separation

In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the specific privileges they require in order to perform a specific task. [1]

38 relations: Capability-based security, Computer network, Computer program, Computer programming, Computer security, Confused deputy problem, Crash (computing), Daemon (computing), Defensive programming, Denial-of-service attack, Exploit (computer security), File system permissions, Fork (system call), Group identifier, List of TCP and UDP port numbers, Network socket, Niels Provos, Nobody (username), OpenBSD security features, Operating system, POSIX, Postfix (software), Principle of least privilege, Privilege (computing), Privilege bracketing, Privilege escalation, Privilege revocation (computing), Process (computing), Run time (program lifecycle phase), Sandbox (computer security), Setuid, Solaris (operating system), System call, Theo de Raadt, Unix domain socket, Unix-like, User identifier, Utility software.

Capability-based security

Capability-based security is a concept in the design of secure computing systems, one of the existing security models.

New!!: Privilege separation and Capability-based security · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Privilege separation and Computer network · See more »

Computer program

A computer program is a collection of instructions for performing a specific task that is designed to solve a specific class of problems.

New!!: Privilege separation and Computer program · See more »

Computer programming

Computer programming is the process of building and designing an executable computer program for accomplishing a specific computing task.

New!!: Privilege separation and Computer programming · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Privilege separation and Computer security · See more »

Confused deputy problem

A confused deputy is a computer program that is innocently fooled by some other party into misusing its authority.

New!!: Privilege separation and Confused deputy problem · See more »

Crash (computing)

In computing, a crash (or system crash) occurs when a computer program, such as a software application or an operating system, stops functioning properly and exits.

New!!: Privilege separation and Crash (computing) · See more »

Daemon (computing)

In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.

New!!: Privilege separation and Daemon (computing) · See more »

Defensive programming

Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances.

New!!: Privilege separation and Defensive programming · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Privilege separation and Denial-of-service attack · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Privilege separation and Exploit (computer security) · See more »

File system permissions

Most file systems have methods to assign permissions or access rights to specific users and groups of users.

New!!: Privilege separation and File system permissions · See more »

Fork (system call)

In computing, particularly in the context of the Unix operating system and its workalikes, fork is an operation whereby a process creates a copy of itself.

New!!: Privilege separation and Fork (system call) · See more »

Group identifier

In Unix-like systems, multiple users can be put into groups.

New!!: Privilege separation and Group identifier · See more »

List of TCP and UDP port numbers

This is a list of TCP and UDP port numbers used by protocols of the application layer of the Internet protocol suite for the establishment of host-to-host connectivity.

New!!: Privilege separation and List of TCP and UDP port numbers · See more »

Network socket

A network socket is an internal endpoint for sending or receiving data within a node on a computer network.

New!!: Privilege separation and Network socket · See more »

Niels Provos

Niels Provos is a researcher in the areas of secure systems, malware and cryptography.

New!!: Privilege separation and Niels Provos · See more »

Nobody (username)

In many Unix variants, "nobody" is the conventional name of a user account which owns no files, is in no privileged groups, and has no abilities except those which every other user has.

New!!: Privilege separation and Nobody (username) · See more »

OpenBSD security features

The OpenBSD operating system is noted for its focus on security and for the development of a number of security features.

New!!: Privilege separation and OpenBSD security features · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Privilege separation and Operating system · See more »

POSIX

The Portable Operating System Interface (POSIX) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems.

New!!: Privilege separation and POSIX · See more »

Postfix (software)

Postfix is a free and open-source mail transfer agent (MTA) that routes and delivers electronic mail.

New!!: Privilege separation and Postfix (software) · See more »

Principle of least privilege

In information security, computer science, and other fields, the principle of least privilege (PoLP, also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.

New!!: Privilege separation and Principle of least privilege · See more »

Privilege (computing)

In computing, privilege is defined as the delegation of authority over a computer system.

New!!: Privilege separation and Privilege (computing) · See more »

Privilege bracketing

In computer security, privilege bracketing is a temporary increase in software privilege within a process to perform a specific function, assuming those necessary privileges at the last possible moment and dismissing them as soon as no longer strictly necessary, therefore ostensibly avoiding fallout from erroneous code that unintentionally exploits more privilege than is merited.

New!!: Privilege separation and Privilege bracketing · See more »

Privilege escalation

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

New!!: Privilege separation and Privilege escalation · See more »

Privilege revocation (computing)

Privilege revocation is the act of an entity giving up some, or all of, the privileges they possess, or some authority taking those (privileged) rights away.

New!!: Privilege separation and Privilege revocation (computing) · See more »

Process (computing)

In computing, a process is an instance of a computer program that is being executed.

New!!: Privilege separation and Process (computing) · See more »

Run time (program lifecycle phase)

In computer science, run time, runtime or execution time is the time during which a program is running (executing), in contrast to other program lifecycle phases such as compile time, link time and load time.

New!!: Privilege separation and Run time (program lifecycle phase) · See more »

Sandbox (computer security)

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.

New!!: Privilege separation and Sandbox (computer security) · See more »

Setuid

setuid and setgid (short for "set user ID upon execution" and "set group ID upon execution", respectively) are Unix access rights flags that allow users to run an executable with the permissions of the executable's owner or group respectively and to change behaviour in directories.

New!!: Privilege separation and Setuid · See more »

Solaris (operating system)

Solaris is a Unix operating system originally developed by Sun Microsystems.

New!!: Privilege separation and Solaris (operating system) · See more »

System call

In computing, a system call is the programmatic way in which a computer program requests a service from the kernel of the operating system it is executed on.

New!!: Privilege separation and System call · See more »

Theo de Raadt

Theo de Raadt (born May 19, 1968) is a software engineer who lives in Calgary, Alberta, Canada.

New!!: Privilege separation and Theo de Raadt · See more »

Unix domain socket

A Unix domain socket or IPC socket (inter-process communication socket) is a data communications endpoint for exchanging data between processes executing on the same host operating system.

New!!: Privilege separation and Unix domain socket · See more »

Unix-like

A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, while not necessarily conforming to or being certified to any version of the Single UNIX Specification.

New!!: Privilege separation and Unix-like · See more »

User identifier

Unix-like operating systems identify a user within the kernel by a value called a user identifier, often abbreviated to user ID or UID.

New!!: Privilege separation and User identifier · See more »

Utility software

Utility software is system software designed to help analyze, configure, optimize or maintain a computer.

New!!: Privilege separation and Utility software · See more »

Redirects here:

Drop privileges, Dropping privileges, Dropping root, Privileges drop, Privileges-drop.

References

[1] https://en.wikipedia.org/wiki/Privilege_separation

OutgoingIncoming
Hey! We are on Facebook now! »