Trusted Operating Systems

 

Protect Your Identity
Cryptography
Firewalls and Filtering Routers
Trusted Operating Systems

Isn't UNIX a trusted operating system?

UNIX, the operating system used to build the Internet, was developed with the idea of maximum "openness," the flexibility to allow different types of computers to communicate with each other. Openness is one of the most valuable principles of the Internet, but it also has some drawbacks. Standard UNIX doesn't have the tools to make sure information is secure. The government has funded the development of "trusted" versions of UNIX for use in government and military agencies' computer networks. A number of different vendors like Hewlett-Packard, IBM and SCO offer trusted operating systems developed by SecureWare in addition to their standard UNIX variants.

What are the advantages of trusted operating systems?

A secure version of UNIX can control access to both information and tasks. A company may want only the people in the finance department to have access to salary information, and only the product managers to have access to business plans and forecasts. With a trusted operating system, files can be labeled according to who has the ability to see, copy, print or alter the contents of the file. Trusted operating systems can also record all suspicious activity, like access violations, logins and logouts, and unsuccessful network connections.