SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
TELKOMNIKA Indonesian Journal of Electrical Engineering
Vol. 13, No. 2, February 2015, pp. 387 ~ 398
DOI: 10.11591/telkomnika.v13i2.7059  387
Received November 19, 2014; Revised January 5, 2015; Accepted January 23, 2015
Dynamic RWX ACM Model Optimizing the Risk on Real
Time Unix File System
P. K. Patra, P. L. Pradhan*
Dept. of CSE Central Institute of Technology, CSVTU, Raipur, CG, India
*Corresponding author, e-mail: citrprcs@rediffmail.com.
Abstract
The preventive control is one of the well advance controls for recent security for protection of data
and services from the uncertainty. Because, increasing the importance of business, communication
technologies and growing the external risk is a very common phenomenon now-a-days. The system
security risks put forward to the management focus on IT infrastructure (OS). The top management has to
decide whether to accept expected losses or to invest into technical security mechanisms in order to
minimize the frequency of attacks, thefts as well as uncertainty. This work contributes to the development
of an optimization model that aims to determine the optimal cost to be invested into security mechanisms
deciding on the measure component of UFS attribute. Our model should be design in such way, the Read,
Write & Execute automatically Protected, Detected and Corrected on RTOS. We have to optimize the
system attacks and down time by implementing RWX ACM mechanism based on semi-group structure,
mean while improving the throughput of the Business, Resources & Technology.
Keyword: read write execute, Unix file system, access control mechanism, preventive detect corrective
control, risk mitigation, real time operating system
Copyright © 2015 Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
The real time operating system is a collection of hardware, software & application
that manages system resources and provides common services for resources, program,
application & users. The operating system is an essential component of the system software
(shell, file & kernel) in computer system. The high level language (application programs) usually
requires an operating system to function. The time-sharing operating systems schedule &
reschedule tasks for efficient use of the internal utilities that may also include auditing system
software for resource & cost allocation of processor and memory time, mass storage, printing
and other resources [4-5].
There are various kinds of preventive control available and implemented on operating
system to protect our IT assets for external & internal hacker. The PDC model & Mechanism
traditionally prevent the core components of OS. The processor & memory is the core
component of any type’s operating system. The processor and kernel is fully functional
dependency on each others, but file and shell is the communication components of the OS. We
can improve the performance of OS by updating the kernel time to time. Kernel is the Nucleus of
the operating system [6-7].
Architecture of the Operating System:
Figure 1. Internal Structure of RTOS
 ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398
388
The operating System control is a step by step process of securely configuring a system
to protect it against unauthorized access, mean while taking steps to make the system more
reliable. Generally anything that is done in the name of system. Preventive control ensures the
system is secure, reliable and high available for high IT culture. Operating system control is the
process to address security weaknesses in operation systems by implementing the latest OS
patches, hot fixes and updates and required management procedures and policies are apply to
reduce attacks and system down time men while increase the throughput of the system.
Preventive control of the operating systems is the first step towards safeguarding systems from
intrusion. The workstations, applications, network and servers typically arrive from the vendor,
installed with a multitude of development tools and utilities, which although beneficial to the
user, also provide potential back-door access to the systems [8-10].
2. Existing Control for the Risk Optimization
2.1. Preventive Controls [6-7], [10]
Preventive controls are implemented to stop the loss related to a risk from occurring
when the risk situation presents itself, the preventive control kicks in and prevent the loss.
Preventive techniques are the most complete form of stop loss control, because the loss is
prevented by their nature. There are costs associated with preventive control that must be
considered to get the full picture of the impact to the business. Prevention can mean the
continuous close examination of each case, performing on analysis for the risk condition and
stopping the risk whenever it is identified. This can be more expensive way to control than
simply enabling the process to perform, identifying errant exceptions after they have occurred
and taking them out of the process stream for corrective action in due course of time. While
attempting to prevent errors whenever it is cost effective to do so, many production lines in the
manufacturing sector also use detective technique to weed out errors, which is a more cost
effective way of dealing with all of the possible permutations of error conditions that may exist in
the process. The alternative of building preventative controls for each scenario would be cost
prohibitive. The monitoring & management of the preventive controls also will need to be
considered when determining what is best for the business.
2.2. Detective Controls [6-7], [10]
Detective controls are used in situations where it is more important to understand that
some things have happened that it was to prevent from happening. In some cases, a detective
control will ensure that a desirable event did indeed occur, providing feedback that the process
is working as intended. Evaluation of the detective controls require proving that the detection
occurs with a high degree of accuracy and reliability. When it is important to detect that an
action has occurred, it will be equally important to rely on the control to not miss any valid
occurrences where that detection should be taking place and to flag only those valid
occurrences of predefined interest. To assess these controls, we will need to understand the
trigger event and the mechanism used to identify it. The risks associated with detective control
are the risk of not knowing a situation or event has occurred .If this failure to detect happens
regularly, the control cannot be assessed as defective. When evaluating the cost-benefit for this
control type, we must review what happens to the process if the events or situation is not
detected and then assess the costs of this scenario against the cost of developing,
implementing and maintaining the control. All system based logs automated generate on the
development & production server.
2.3. Corrective Controls [6-7], [10]
A corrective control fixes errant situations or events as they are identified. It assumes
some amount of detection is inherent in its mission of fixing out-of-bonds conditions. These
controls are useful when simple corrections are easily found and fixed a process without lot of
risk and complexity. The risk of not finding and fixing these items must be considered when
assessing the total cost and benefit of such a control. It will need to be determined that
corrective actions are possible and performed accurately to the satisfaction of the process in
order to draw conclusions that these kinds of controls are effective. Determining what is
acceptable in terms of corrective actions will be part of this process. Those situations that are
not caught and fixed that do not require attention will need to be identified and examined for
TELKOMNIKA ISSN: 2302-4046 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra)
389
false positive and false negative implications. Comparing this control to one that prevented the
need for correction in the first place may be valid assessment when evaluating whether the right
kinds of controls are employed to mitigate risk in a process. The cost to fix along with cost to
identified or cost to prevent all will now need to be part of the cost benefit analysis. The PC, DC,
CC & High Availability are a great services to data & services all the time in around the globe.
Figure 2. PDC Preventing Data & Services
3. Data Collection Based on Existing Control (RTOS DATA)
There are number of preventive control methods design and developed as per
requirement of the secure computing to achieve the desired level of organization objective.
There are few methods developed based on UNIX server and system programming. The
preventive control is inversely proportional to the Risk [4-5], [8-9].
Table 1. Sample of RTOS UFS Data Collection
SN SYSTEM FILES ACTION PLAN REMARKS
1 /etc/system Can be update the kernel & n-bit processor Can be improve the
system performance
KERNEL
2 /etc/hosts Develop the scripts: allow/disallow as per policy, chimed
000= /etc/nnn-mark disallow
Preventative control
[ H, M, L ]
Can be improve the
system security
3 /etc/services Disable the third parties services. Remove the ftp, http,
telnet, port no, printer, IP services. Those services are
not required.
preventative control
[ H, M, L ] Can be
improve the system
security
4 /use/bin/rash,
etc/pam.conf
Disable all remote services: chmod 000 /usr/bin/rsh, rksh,
rcp, ipcs, ruser, rlogin, uptime.
Preventative control
SHELL
5 /vary/dam/message Date & time stamp ( DC: event mgmt) Internal audit purpose
Detective control
6 /etc/rc.conf script Run level script
Run level script have to develop as per requirement.
/etc/init.conf,rc2.d example: httpd_flags="NO"
preventative control
[ H, M, L ]
7 /etc/init.conf OS services, run level Preventative control
8 etc/ssh/sshd_config
CKM file system
Automated Control
Cryptography enable through ssh implementation
AES: 256 bits chipper
aes256-chr.ssh-key gen -b 1024 -f /etc/ssh_host_key -
n '' chmod - - - /etc/ssh/ssh_config
preventative control
n=1024, 2048, 4096
chimed r w x (i. e. 4 2 1 )
– blank is nothing
[ H, M, L ]
 ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398
390
4. Existing in UFS Problem
As per above data collection, the automated control (PDC) is not available of the recent
RTOS. There is great risk on the corrective action & reaction on file system, application &
resources on this current security age. The multiple Relation, Function, Operation and Services
is happening over a multiple clients, business, application and resources on a complex
heterogeneous IT infrastructure for all the time & every time. Therefore, resource conflicts are
the biggest issue over a complex network, platform and user application.
5. Proposed Dynamic RWX ACM Model for Risk Optimization
This paper contributes to the define and development of an optimal model that our
objective to determine the minimal cost, quality & time to be invested into the risk assessment
and management on the measure components of Unix file system attributes (Read, Write &
Execute). That’s why we are calling as it RWX model for system based risk analysis.
Furthermore, this mechanism optimize the cost, time & resources is supposed to reduce the
system attack, down time and vulnerabilities. We have to optimize the technology & resource
cost and maximizes the business (throughput). We have to protect our data and services to over
a multiple business, resources & technology on all the time (24 x 7 x 52).
Figure 3. Technology, Business & Resources Preventing Data & Services
We have to implement our idea based on the SEMIGROUP (isomorphism graph)
theory, how the operating system optimizing as per our business requirement. Our objective is
that maximize our business (throughput) and minimizes our technology & resources cost and
time.
5.1. Define
We have to design & develop this optimization method based on Semi group. Like a
semi group is a set with a binary operation but there is no requirement for an inverse function or
an identity elements. In order to be a semi group, a set of objects plus an operation, must obey
the following axioms. A semi group is important when we are looking at cosets.For all r, w, x €
S, the equation ( r. w ) . x = r . (w. x) holds. For all p, d, c € S, the equation ( p . d ) . c = p . (d .
c) holds [1-3].
PDC:
Associative Low: (P U D) U C = P U ( D U C), (P ∩ D) ∩ C = P ∩ ( D ∩ C)
Distributive Low: P U (D ∩ C) = (P U D) ∩ (P U C), P ∩ (D U C) = (P ∩ D) U (P ∩ C)
RWX:
Associative Low: (R U W) U X = R U ( W U X) , (R ∩ W) ∩ X = R ∩ ( W ∩ X)
Distributive Low: R U (W ∩ X) = (R U W ) ∩ (R U X), R ∩ (W U X) = (R ∩ W) U (R ∩ X)
Let us consider R={P, D, C} & M={R, W, X ). It is easy to verify that the following
operation tables give Semi Group Structures for R & M respectively.
TELKOMNIKA ISSN: 2302-4046 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra)
391
We have to maintain the sequence as follows: 1st
we have take care of the Prevent, 2nd
Detect, then Correct. These three parameters should be satisfied according to our data &
services for better performance & high security.
The High Availability is Risk Mitigation. [K=PC+DC+CC ]. We can optimize the risk
factor by help of these six elements. All these sixe elements depend on each others.
Availabilities is the main concern among the all of them.
As per business & resource management the PDC & RWX Model and Mechanism are
very well suited for multiple RFOS & Technology in around the globe on 24 x 7 x 52 pattern.
5.2. Design
This isomorphism sets of elements are equally satisfying to the transitive, union of,
associative, distributive & composition and Sum of all for the Risk Mitigation. We are proposing
this idea based on directed graph theory as follows. We have to design and develop the security
& reliability policy for our complex IT infrastructure. We have to find out the best solution to
applying step by step of algorithm, method, model & mechanism. We have to draw two identical
directed graph one for PDC & another for RWX. The both of these two directed graph working
for high availability on 24 x 7 x 52 pattern in around the security world as follows [1-3].
Figure 4. (a) [PDC] Figure 4. (b) [RWX]
We can find the composition of the table as follow:
Table 2. (a) [ PDCA ] Table 2. (b) [ RWXA ]
X P C D A X R W X H
P P C D A R R W X H
C C P A D W W R H X
D D A P C X X H R W
A A D C P H H X W R
Associative law: Multiplication is associative in G, since associative law holds in case of
matrix multiplication: (PC) D = P (CD) Where A= Availability, H= High Availability. Let us onsider
R={P,D,C} & M={R, W, X). It is easy to verify that the following operation table gives Semi
Group Structures for R & M respectively. AN ISOMORPHISM GRAPH in Between M & R, f(p) =
1, f(d) = 6, f(c) = 8,f(a) = 3, f(c) = 5, f(i) = 2, f(a.t) = 4, f(h) =7.
 ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398
392
Figure 5(a) Figure 5(b)
5.3. Development (Function)
We have to move forward to finding alternate solution and algorithm for risk optimization
on semi-group method. This scalable complex semi group method definitely will be solve our
risk and security issue on complex real time system for multiple client application, business and
resources available for multi- location on any time around the clock. We have to optimize the
RTOS step by step as follows:
Table 3. [ DPC ->RWX ] Model-1.a Prevention on Write Access DCP Verses RWX
* D C P * R W X
D D C P R X R i
C C P D W R X
P P D C X S X R
Now write access is preventive stage. Prevention is better than cure.
Diagonal view (P-P-P=W-W-W) BUSINESS OWNER et us consider that: f(D)=W,
f(C)=R, f(P)=X.
Now, replacing the function in R by their images and rearranging the tables, we obtain
exactly the table for M. Thus R & M are Isomorphic. Therefore, this model is called“ SEMI-
GROUP as well as ISOMORPHIC MODEL ON SYSTEM SECURITY FOR RISK
OPTIMIZATION”. Then we can move forwards to the NEXT OPTIMIZED LEVEL as follows.
Table 4. [ PDC ->RWX ] Model-1.b Detection on Write Access PDC Verses RWX
* P D C * R W X
P C P X X R IS
D P M C W R X
C D C P R S X R
OPTIMIZED LEVEL NOW WRITE ACCESS IS DETECTIVE STAGE,
Diagonal view (D-D-D=W-W-W) BUSINESS OWNER
D W
P
P
P W
W
W
D
D
W
W
TELKOMNIKA ISSN: 2302-4046 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra)
393
Table 5. [ DPC ->RWX ] Model-1.c Correction on Write Access DCP Verses RWX
* D C P * R W X
D P D C X X R S
C D E P W R X
P C P D R I X R
NOW WRITE ACCESS IS CORRECTIVE STAGE. Diagonal view (C-C-C=W-W-W)
BUSINESS OWNER
Figure 6. Write Activities
This graphical representation show that, WRITE ACCESS is prevented, detected and
corrected automatically.
Table 6. [ DCP ->RXW ] Model 2.a PREVENTION ON EXECUTE ACCESS DCP Verses RXW
* D C P * R W X
D D C R W R
C C P D X R W
P D C W W R
NOW EXECUTE ACCESS IS PREVENTIVE STAGE (ANY BODY, ANY WHERE &
ANY TIME
PREVENTION IS BETTER THAN CURE. Diagonal view (P-P-P=X-X-X) OTHER.
P
P
P
X
X
W
C I
C
C
W
W
X
 ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398
394
Table 7. [ PDC ->RXW ] Model:2.b DETECTION ON AUTHENTICATION PDC Verses RXW
* P D C * R W X
P C P R I R
D P C X R S W
C C P W W R
OPTIMIZED LEVEL, NOW EXECUTE ACCESS IS
DETECTIVE STAGE. Diagonal view (D-D-D=X-X-X) OTHER.
Table 8. [ DCP ->RXW ] Model: 2.c CORRECTION ON AILABILITY DCP verses RXW
* D C P * R W X
D P D R W R
C D P X C CC I
P P D W i C
NOW EXECUTE ACCESS IS CORRECTIVE STAGE, Diagonal view (C-C-C=X-X-X) OTHER
Figure 7. Execute Activities
This graphical representation show that, EXECUTE ACCESS is prevented, detected
and corrected on the objects in automated way.
Table 9. [ DCP ->WRX ] Model:3.a PREVENTION ON READ ACCESS DCP Verses WRX
* D C P * W R X
D D C W X W K
C C D R W X
P D C X X W
NOW READ ACCESS IS PREVENTIVE STAGE. PREVENTION IS BETTER THAN
CURE.
Diagonal view (P-P-P=R-R-R) BUSINESS OWNER
P
P
P
R
R
R
X
D
D
D
X
X
X
X
C
C
C
X
X
TELKOMNIKA ISSN: 2302-4046 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra)
395
Table 10. [ PDC ->WRX ] Model:3.b DETECTION MATRIX ON READ ACCES PDC Verses
WRX
* P D C * W R X
P C P W X W K
D P C R W X
C C P X X W
OPTIMIZED LEVEL DETECTING THE READ ACCESS .
Diagonal view (D-D-D=R-R-R) BUSINESS OWNER
Table 11. [ DCP->WRX ] Model: 3.c CORRECTION THE CONFIDENTIALITY DCP Verses
WRX
* D C P * W R X
D P D W X W K
C D P R W X
P P D X X W
NOW READ ACCESS IS CORRECTIVE STAGE Diagonal view (C-C-C=R-R-R) BUSINESS
OWNER
Figure 8. Read Activities
This graphical representation shows that, READ is prevented, detected and corrected
automatically. This is the dynamic life cycle of PDC & RWX based on the semi-group,
isomorphic & directed graph theory. When RWX optimization technique applied on OS, the
space & time complexity of Processor, Memory and users details can be detected by OS
system parameters is already defined in existing risk assessment method on file system (
/var/adm/messages), then we can fix up the unix file system (UFS) as per availability of
technology, resources and business requirement. In this way we can dynamically optimize our
technology & business risk.
We can conclude that from the above optimization model the operating system
components are the shell, file, processor, memory & encryption key have to take highest
priorities of the Preventive, Detective and Corrective, action plan, which is shown in the model
1, 2 & 3 respectively. In this way, we can improve the performance & security of the high end
READ, WRITE and EXECUTE attributes for the technology, business & resources. The
preventive control will be facilitate and resolve the various issue when it spans several jobs and
applications are running simultaneously under heterogeneous complex based web
D
D
D
R
R
C
C
C
R
R
R
R
 ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398
396
infrastructure (B2B, B2C, P2P, G2G ) in around the web world. These above optimization
models will be very helpful for Instruction level parallelism for high end computing. We hope this
theoretical and experimental idea will be very much help to the parallel computing environment
to optimize the operating system software risk. We can improve our risk optimization model
that, which will be help to the risk management on operating system.
5.4. Brief Summary of the Dynamic RWX ACM Model
Table 12. Life Cycle of PDC & RWX Operation
MODEL STAGE DESCRIPTION ACTION PLAN
Model-
1.a
Model-
1.b
Model-
1.c
1
st
Round: on
Write Access
Diagonal view (P-P-P=W-W-
W)
Diagonal view (D-D-D=W-
W-W)
Diagonal view (C-C-C=W-
W-W)
Preventive Control on Write Access
Detective Control on Write Access
Corrective control on Write Access
Model-
2.a
Model-
2.b
Model-
2.c
2
nd
Round: Execute
Access
Diagonal view (P-P-P-X-X-
X)
Diagonal view (D-D-D= X-X-
X)
Diagonal view (C-C-C= X-X-
X)
Preventive Control on Execute Access
Detective Control on Execute Access
Corrective control on Execute Access
Model-
3.a
Model-
3.b
Model-
3.c
3
rd
Round:
Read Access
Diagonal view (P-P-P=R-R-
R)
Diagonal view(D-D-D=R-R-
R))
Diagonal view(C-C-C- R-R-
R)
Preventive Control on Read Access
Detective Control on Read Access Corrective
Control on Read Access
Model-
1.c
Model-
2.c
Model-
3.c
Automated Corrective
Control
Diagonal view (C-C-C-W-W-
W)
Diagonal view (C-C-C-X-X-
X)
Diagonal view(C-C-C-R-R-
R)
Corrective control on Write Access
Corrective control on Executive Access
Corrective control on Read Access
5.5. Deployment: (Test, Verification, Results & Services) Practical Implact Analysis on
RWX ACM Model
We have to verify & validated the operating system integrity, high availability, reliability,
scalability, reliability of Read, Write & Execute Access over a UFS on RTOS. We have to
protect, Detect and Correct the UFS per business, resource requirement and availability of
technology. We have to apply some review method on internal UNIX operating system on super
user mode. This table(3) is the part of benchmarking, performance analysis and risk
assessment of real time operating system over a complex web portal application on large scale
RTOS.
Table 13. Verification of RTOS [8], [9]
SN INPUT ( Subject )
How to do ?
DESCRIPTIONS ACTION PLAN
What to do?
Risk Assessment OUTPUT (Object)
What happen & When ??
01 /var/adm/message System mesg ( event mgmt ) DC Date & time stamp
SECONDARY RISK ASSESSMENT
02 /var/adm/syslog syslog system logs Detective control, Accountability & Authentication
03 /var/adm/sulog super user log Detective control, Accountability & Authentication
04 /var/adm/loginlog user login log Detective control, Accountability & Authentication
05 etc/ssh/sshd_config AES, CKM Key mgmt Run the scripts: Preventive control
TELKOMNIKA ISSN: 2302-4046 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra)
397
6. Results (Services) [Efficient Resource Management]
The subject and object can able to mapping, synchronize and optimize through real
time operating system. This virtual programming utilities and application will be more
measurable and accountable for performance, fault tolerance, throughput, bench marking and
risk assessment on any application over a complex IT infrastructure. How is behaving the
(MIMD) UNIX server along with its sub components, when we are running on the different
processor, memory & encryption key on the same programming & application or reverse way?
The iostat, vmstat and pmstat commands will be give the full detail output statistics of processor
and memory on real time operating system. The primary risk can be analysis on right time and
right way. The /var/adm/message scripts will be give the output statistics of hardware and
software problem of real time event management system including date and time stamp on unix
machine. We can verify and validate the access control mechanism (ACM) by help of these
scripts, which is already mentioned on table 13. (/var/adm/sulog, syslog, login log).
a) How is the system behaving, when millions of users accessing the same piece of
data & information in around the clock ( high availability, scalability and reliability).
In this ways, we can improve the ACM, performance, benchmarking, fault tolerance
and risk assessment at a time to utilizing the above scripts and virtualization
concept, which is help to our business, technology and society in around the globe.
b) Maximize the protection, detection & correction ( PDC ) at optimal cost and time.
c) Maximize the performance, reliability, high availability at optimal cost (TQM ).
d) Maximum utilization of resources at minimal cost at right time in right way.
7. Conclusion
This dynamic RWX is a one of the best preventive control, which is providing
accountability for individuals who are accessing sensitive information on shell, file system &
kernel. The accountabilities is accomplished through access control mechanisms (ACM) that
require identification, authentication, authorization, accountability, non-repudiation, availability,
reliability & integrity through the audit function on various file system. The large scale
optimization can be done in this way to protect, detect & correct the RWX model for efficient
resource management in a dynamic way of the web application over a RTOS. A sound
information security policy identifies prevention, detection, and response measures on various
components of system security. This above model provides more details on risk assessment
tools and practices that may be used to improve information security programs. The preventive
measures may include regularly using vulnerability assessment tools and conducting periodic
penetration analyses. Intrusion detection tools can be effective in detecting potential intrusions
or system misuse. Our research & development should also develop a response. By reading
through this paper and utilizing the model & mechanism for preventive, detective and corrective
action plan of the organization is a great benefits. The security programmer & administrator
now have a base knowledge of security, server hardening, intrusion detection, auditing and
security tools. This knowledge can be directly applied to their servers and many vulnerable
holes will now be filled. Therefore, it is critical that every unix security-minded programmer
maintains their knowledge of security by researching and referring to the Internet resources that
have been mentioned in survey data collection. If there is ever a question about updating &
implementation of any of the suggested features, refer to the OS server security manuals that
were designated with the specified feature (all features have been research, design, developed
& documented).
References
[1] Bernard, Kolman. Discrete Mathematical Structures. New Delhi, India: Person Education India (PHI).
2007.
[2] Edgar G. Discrete Mathematics with Graph Theory. New Delhi, India: Person India (PHI). 2007.
[3] Joe L Matt. Discrete Mathematics for Scientist and Mathematician. New Delhi, India: Person
Education India (PHI). 2008.
[4] Hwang, Kai. Advance Computer Architecture. New Delhi, India: Tata McGraw Hill. 2008
[5] O’ Reilly. Essential of System Administration. O’ Reilly Media: USA. 1995.
[6] Shon, Harrish. CISSP Exam study guide, New Delhi, India: Dreamtech. 2002
[7] Shon, Harrish. Security Management Practices. New Delhi, India : Wiley Publishing Inc. 2002
 ISSN: 2302-4046
TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398
398
[8] Sumitabh Das. UNIX System V UNIX Concept & Application. Delhi, India: Tata McGraw Hill.2009.
[9] Sun-Microsystem. UNIX Sun Solaris system administration. USA. 2002.
[10] Weber, Ron. Information System Control & Audit. New Delhi, India: Person Education India (PHI).
2002.

Weitere ähnliche Inhalte

Was ist angesagt?

Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9Ian Sommerville
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)James W. De Rienzo
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safetydalesanders
 
Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...IJECEIAES
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementChris Furton
 
IRJET- Maintenance and Reliability Strategy of Mechanical Equipment in Industry
IRJET- Maintenance and Reliability Strategy of Mechanical Equipment in IndustryIRJET- Maintenance and Reliability Strategy of Mechanical Equipment in Industry
IRJET- Maintenance and Reliability Strategy of Mechanical Equipment in IndustryIRJET Journal
 
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3EMC
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleDonald E. Hester
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuillermo Remache
 
Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Ian Sommerville
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 

Was ist angesagt? (19)

Ch12-Software Engineering 9
Ch12-Software Engineering 9Ch12-Software Engineering 9
Ch12-Software Engineering 9
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
8. operational risk management
8.  operational risk management8.  operational risk management
8. operational risk management
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safety
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability Management
 
IRJET- Maintenance and Reliability Strategy of Mechanical Equipment in Industry
IRJET- Maintenance and Reliability Strategy of Mechanical Equipment in IndustryIRJET- Maintenance and Reliability Strategy of Mechanical Equipment in Industry
IRJET- Maintenance and Reliability Strategy of Mechanical Equipment in Industry
 
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
 
Ch20
Ch20Ch20
Ch20
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Patch Management
Patch ManagementPatch Management
Patch Management
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 

Ähnlich wie Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System

Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...ijeei-iaes
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
Book 2_Bab 11_Information Technology and ERM.pdf
Book 2_Bab 11_Information Technology and ERM.pdfBook 2_Bab 11_Information Technology and ERM.pdf
Book 2_Bab 11_Information Technology and ERM.pdfnoygemma2
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09pladott11
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
InTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfInTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfglan Glandeva
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
Lecture 6 & 7.pdf
Lecture 6 & 7.pdfLecture 6 & 7.pdf
Lecture 6 & 7.pdfRaoShahid10
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial deviceIJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsIRJET Journal
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlationfrantzyv
 
future internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docxfuture internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docxgilbertkpeters11344
 
future internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Frafuture internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management FraDustiBuckner14
 
Future internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fraFuture internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fraarnit1
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 

Ähnlich wie Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (20)

Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
Book 2_Bab 11_Information Technology and ERM.pdf
Book 2_Bab 11_Information Technology and ERM.pdfBook 2_Bab 11_Information Technology and ERM.pdf
Book 2_Bab 11_Information Technology and ERM.pdf
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
InTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfInTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdf
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Lecture 6 & 7.pdf
Lecture 6 & 7.pdfLecture 6 & 7.pdf
Lecture 6 & 7.pdf
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlation
 
future internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docxfuture internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docx
 
future internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Frafuture internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Fra
 
Future internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fraFuture internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fra
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 

Mehr von Radita Apriana

False Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkFalse Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkRadita Apriana
 
ESL Reading Research Based on Eye Tracking Techniques
ESL Reading Research Based on Eye Tracking TechniquesESL Reading Research Based on Eye Tracking Techniques
ESL Reading Research Based on Eye Tracking TechniquesRadita Apriana
 
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsA New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsRadita Apriana
 
Internet Access Using Ethernet over PDH Technology for Remote Area
Internet Access Using Ethernet over PDH Technology for Remote AreaInternet Access Using Ethernet over PDH Technology for Remote Area
Internet Access Using Ethernet over PDH Technology for Remote AreaRadita Apriana
 
A New Ozone Concentration Regulator
A New Ozone Concentration RegulatorA New Ozone Concentration Regulator
A New Ozone Concentration RegulatorRadita Apriana
 
Identifying of the Cielab Space Color for the Balinese Papyrus Characters
Identifying of the Cielab Space Color for the Balinese Papyrus CharactersIdentifying of the Cielab Space Color for the Balinese Papyrus Characters
Identifying of the Cielab Space Color for the Balinese Papyrus CharactersRadita Apriana
 
Filtering Based Illumination Normalization Techniques for Face Recognition
Filtering Based Illumination Normalization Techniques for Face RecognitionFiltering Based Illumination Normalization Techniques for Face Recognition
Filtering Based Illumination Normalization Techniques for Face RecognitionRadita Apriana
 
Analysis and Estimation of Harmonics Using Wavelet Technique
Analysis and Estimation of Harmonics Using Wavelet TechniqueAnalysis and Estimation of Harmonics Using Wavelet Technique
Analysis and Estimation of Harmonics Using Wavelet TechniqueRadita Apriana
 
A Novel Method for Sensing Obscene Videos using Scene Change Detection
A Novel Method for Sensing Obscene Videos using Scene Change DetectionA Novel Method for Sensing Obscene Videos using Scene Change Detection
A Novel Method for Sensing Obscene Videos using Scene Change DetectionRadita Apriana
 
Robust SINS/GNSS Integration Method for High Dynamic Applications
Robust SINS/GNSS Integration Method for High Dynamic ApplicationsRobust SINS/GNSS Integration Method for High Dynamic Applications
Robust SINS/GNSS Integration Method for High Dynamic ApplicationsRadita Apriana
 
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkStudy on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkRadita Apriana
 
Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...
Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...
Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...Radita Apriana
 
A Review to AC Modeling and Transfer Function of DCDC Converters
A Review to AC Modeling and Transfer Function of DCDC ConvertersA Review to AC Modeling and Transfer Function of DCDC Converters
A Review to AC Modeling and Transfer Function of DCDC ConvertersRadita Apriana
 
DTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase Fault
DTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase FaultDTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase Fault
DTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase FaultRadita Apriana
 
Impact Analysis of Midpoint Connected STATCOM on Distance Relay Performance
Impact Analysis of Midpoint Connected STATCOM on Distance Relay PerformanceImpact Analysis of Midpoint Connected STATCOM on Distance Relay Performance
Impact Analysis of Midpoint Connected STATCOM on Distance Relay PerformanceRadita Apriana
 
Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...
Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...
Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...Radita Apriana
 
Similarity and Variance of Color Difference Based Demosaicing
Similarity and Variance of Color Difference Based DemosaicingSimilarity and Variance of Color Difference Based Demosaicing
Similarity and Variance of Color Difference Based DemosaicingRadita Apriana
 
Energy Efficient RF Remote Control for Dimming the Household Applainces
Energy Efficient RF Remote Control for Dimming the Household ApplaincesEnergy Efficient RF Remote Control for Dimming the Household Applainces
Energy Efficient RF Remote Control for Dimming the Household ApplaincesRadita Apriana
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...Radita Apriana
 
Optimal Warranty Policy Considering Two-dimensional Imperfect Preventive Main...
Optimal Warranty Policy Considering Two-dimensional Imperfect Preventive Main...Optimal Warranty Policy Considering Two-dimensional Imperfect Preventive Main...
Optimal Warranty Policy Considering Two-dimensional Imperfect Preventive Main...Radita Apriana
 

Mehr von Radita Apriana (20)

False Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkFalse Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor Network
 
ESL Reading Research Based on Eye Tracking Techniques
ESL Reading Research Based on Eye Tracking TechniquesESL Reading Research Based on Eye Tracking Techniques
ESL Reading Research Based on Eye Tracking Techniques
 
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsA New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO Systems
 
Internet Access Using Ethernet over PDH Technology for Remote Area
Internet Access Using Ethernet over PDH Technology for Remote AreaInternet Access Using Ethernet over PDH Technology for Remote Area
Internet Access Using Ethernet over PDH Technology for Remote Area
 
A New Ozone Concentration Regulator
A New Ozone Concentration RegulatorA New Ozone Concentration Regulator
A New Ozone Concentration Regulator
 
Identifying of the Cielab Space Color for the Balinese Papyrus Characters
Identifying of the Cielab Space Color for the Balinese Papyrus CharactersIdentifying of the Cielab Space Color for the Balinese Papyrus Characters
Identifying of the Cielab Space Color for the Balinese Papyrus Characters
 
Filtering Based Illumination Normalization Techniques for Face Recognition
Filtering Based Illumination Normalization Techniques for Face RecognitionFiltering Based Illumination Normalization Techniques for Face Recognition
Filtering Based Illumination Normalization Techniques for Face Recognition
 
Analysis and Estimation of Harmonics Using Wavelet Technique
Analysis and Estimation of Harmonics Using Wavelet TechniqueAnalysis and Estimation of Harmonics Using Wavelet Technique
Analysis and Estimation of Harmonics Using Wavelet Technique
 
A Novel Method for Sensing Obscene Videos using Scene Change Detection
A Novel Method for Sensing Obscene Videos using Scene Change DetectionA Novel Method for Sensing Obscene Videos using Scene Change Detection
A Novel Method for Sensing Obscene Videos using Scene Change Detection
 
Robust SINS/GNSS Integration Method for High Dynamic Applications
Robust SINS/GNSS Integration Method for High Dynamic ApplicationsRobust SINS/GNSS Integration Method for High Dynamic Applications
Robust SINS/GNSS Integration Method for High Dynamic Applications
 
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkStudy on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
 
Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...
Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...
Solving Method of H-Infinity Model Matching Based on the Theory of the Model ...
 
A Review to AC Modeling and Transfer Function of DCDC Converters
A Review to AC Modeling and Transfer Function of DCDC ConvertersA Review to AC Modeling and Transfer Function of DCDC Converters
A Review to AC Modeling and Transfer Function of DCDC Converters
 
DTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase Fault
DTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase FaultDTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase Fault
DTC Method for Vector Control of 3-Phase Induction Motor under Open-Phase Fault
 
Impact Analysis of Midpoint Connected STATCOM on Distance Relay Performance
Impact Analysis of Midpoint Connected STATCOM on Distance Relay PerformanceImpact Analysis of Midpoint Connected STATCOM on Distance Relay Performance
Impact Analysis of Midpoint Connected STATCOM on Distance Relay Performance
 
Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...
Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...
Optimal Placement and Sizing of Distributed Generation Units Using Co-Evoluti...
 
Similarity and Variance of Color Difference Based Demosaicing
Similarity and Variance of Color Difference Based DemosaicingSimilarity and Variance of Color Difference Based Demosaicing
Similarity and Variance of Color Difference Based Demosaicing
 
Energy Efficient RF Remote Control for Dimming the Household Applainces
Energy Efficient RF Remote Control for Dimming the Household ApplaincesEnergy Efficient RF Remote Control for Dimming the Household Applainces
Energy Efficient RF Remote Control for Dimming the Household Applainces
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
 
Optimal Warranty Policy Considering Two-dimensional Imperfect Preventive Main...
Optimal Warranty Policy Considering Two-dimensional Imperfect Preventive Main...Optimal Warranty Policy Considering Two-dimensional Imperfect Preventive Main...
Optimal Warranty Policy Considering Two-dimensional Imperfect Preventive Main...
 

Kürzlich hochgeladen

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Kürzlich hochgeladen (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System

  • 1. TELKOMNIKA Indonesian Journal of Electrical Engineering Vol. 13, No. 2, February 2015, pp. 387 ~ 398 DOI: 10.11591/telkomnika.v13i2.7059  387 Received November 19, 2014; Revised January 5, 2015; Accepted January 23, 2015 Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System P. K. Patra, P. L. Pradhan* Dept. of CSE Central Institute of Technology, CSVTU, Raipur, CG, India *Corresponding author, e-mail: citrprcs@rediffmail.com. Abstract The preventive control is one of the well advance controls for recent security for protection of data and services from the uncertainty. Because, increasing the importance of business, communication technologies and growing the external risk is a very common phenomenon now-a-days. The system security risks put forward to the management focus on IT infrastructure (OS). The top management has to decide whether to accept expected losses or to invest into technical security mechanisms in order to minimize the frequency of attacks, thefts as well as uncertainty. This work contributes to the development of an optimization model that aims to determine the optimal cost to be invested into security mechanisms deciding on the measure component of UFS attribute. Our model should be design in such way, the Read, Write & Execute automatically Protected, Detected and Corrected on RTOS. We have to optimize the system attacks and down time by implementing RWX ACM mechanism based on semi-group structure, mean while improving the throughput of the Business, Resources & Technology. Keyword: read write execute, Unix file system, access control mechanism, preventive detect corrective control, risk mitigation, real time operating system Copyright © 2015 Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction The real time operating system is a collection of hardware, software & application that manages system resources and provides common services for resources, program, application & users. The operating system is an essential component of the system software (shell, file & kernel) in computer system. The high level language (application programs) usually requires an operating system to function. The time-sharing operating systems schedule & reschedule tasks for efficient use of the internal utilities that may also include auditing system software for resource & cost allocation of processor and memory time, mass storage, printing and other resources [4-5]. There are various kinds of preventive control available and implemented on operating system to protect our IT assets for external & internal hacker. The PDC model & Mechanism traditionally prevent the core components of OS. The processor & memory is the core component of any type’s operating system. The processor and kernel is fully functional dependency on each others, but file and shell is the communication components of the OS. We can improve the performance of OS by updating the kernel time to time. Kernel is the Nucleus of the operating system [6-7]. Architecture of the Operating System: Figure 1. Internal Structure of RTOS
  • 2.  ISSN: 2302-4046 TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398 388 The operating System control is a step by step process of securely configuring a system to protect it against unauthorized access, mean while taking steps to make the system more reliable. Generally anything that is done in the name of system. Preventive control ensures the system is secure, reliable and high available for high IT culture. Operating system control is the process to address security weaknesses in operation systems by implementing the latest OS patches, hot fixes and updates and required management procedures and policies are apply to reduce attacks and system down time men while increase the throughput of the system. Preventive control of the operating systems is the first step towards safeguarding systems from intrusion. The workstations, applications, network and servers typically arrive from the vendor, installed with a multitude of development tools and utilities, which although beneficial to the user, also provide potential back-door access to the systems [8-10]. 2. Existing Control for the Risk Optimization 2.1. Preventive Controls [6-7], [10] Preventive controls are implemented to stop the loss related to a risk from occurring when the risk situation presents itself, the preventive control kicks in and prevent the loss. Preventive techniques are the most complete form of stop loss control, because the loss is prevented by their nature. There are costs associated with preventive control that must be considered to get the full picture of the impact to the business. Prevention can mean the continuous close examination of each case, performing on analysis for the risk condition and stopping the risk whenever it is identified. This can be more expensive way to control than simply enabling the process to perform, identifying errant exceptions after they have occurred and taking them out of the process stream for corrective action in due course of time. While attempting to prevent errors whenever it is cost effective to do so, many production lines in the manufacturing sector also use detective technique to weed out errors, which is a more cost effective way of dealing with all of the possible permutations of error conditions that may exist in the process. The alternative of building preventative controls for each scenario would be cost prohibitive. The monitoring & management of the preventive controls also will need to be considered when determining what is best for the business. 2.2. Detective Controls [6-7], [10] Detective controls are used in situations where it is more important to understand that some things have happened that it was to prevent from happening. In some cases, a detective control will ensure that a desirable event did indeed occur, providing feedback that the process is working as intended. Evaluation of the detective controls require proving that the detection occurs with a high degree of accuracy and reliability. When it is important to detect that an action has occurred, it will be equally important to rely on the control to not miss any valid occurrences where that detection should be taking place and to flag only those valid occurrences of predefined interest. To assess these controls, we will need to understand the trigger event and the mechanism used to identify it. The risks associated with detective control are the risk of not knowing a situation or event has occurred .If this failure to detect happens regularly, the control cannot be assessed as defective. When evaluating the cost-benefit for this control type, we must review what happens to the process if the events or situation is not detected and then assess the costs of this scenario against the cost of developing, implementing and maintaining the control. All system based logs automated generate on the development & production server. 2.3. Corrective Controls [6-7], [10] A corrective control fixes errant situations or events as they are identified. It assumes some amount of detection is inherent in its mission of fixing out-of-bonds conditions. These controls are useful when simple corrections are easily found and fixed a process without lot of risk and complexity. The risk of not finding and fixing these items must be considered when assessing the total cost and benefit of such a control. It will need to be determined that corrective actions are possible and performed accurately to the satisfaction of the process in order to draw conclusions that these kinds of controls are effective. Determining what is acceptable in terms of corrective actions will be part of this process. Those situations that are not caught and fixed that do not require attention will need to be identified and examined for
  • 3. TELKOMNIKA ISSN: 2302-4046  Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra) 389 false positive and false negative implications. Comparing this control to one that prevented the need for correction in the first place may be valid assessment when evaluating whether the right kinds of controls are employed to mitigate risk in a process. The cost to fix along with cost to identified or cost to prevent all will now need to be part of the cost benefit analysis. The PC, DC, CC & High Availability are a great services to data & services all the time in around the globe. Figure 2. PDC Preventing Data & Services 3. Data Collection Based on Existing Control (RTOS DATA) There are number of preventive control methods design and developed as per requirement of the secure computing to achieve the desired level of organization objective. There are few methods developed based on UNIX server and system programming. The preventive control is inversely proportional to the Risk [4-5], [8-9]. Table 1. Sample of RTOS UFS Data Collection SN SYSTEM FILES ACTION PLAN REMARKS 1 /etc/system Can be update the kernel & n-bit processor Can be improve the system performance KERNEL 2 /etc/hosts Develop the scripts: allow/disallow as per policy, chimed 000= /etc/nnn-mark disallow Preventative control [ H, M, L ] Can be improve the system security 3 /etc/services Disable the third parties services. Remove the ftp, http, telnet, port no, printer, IP services. Those services are not required. preventative control [ H, M, L ] Can be improve the system security 4 /use/bin/rash, etc/pam.conf Disable all remote services: chmod 000 /usr/bin/rsh, rksh, rcp, ipcs, ruser, rlogin, uptime. Preventative control SHELL 5 /vary/dam/message Date & time stamp ( DC: event mgmt) Internal audit purpose Detective control 6 /etc/rc.conf script Run level script Run level script have to develop as per requirement. /etc/init.conf,rc2.d example: httpd_flags="NO" preventative control [ H, M, L ] 7 /etc/init.conf OS services, run level Preventative control 8 etc/ssh/sshd_config CKM file system Automated Control Cryptography enable through ssh implementation AES: 256 bits chipper aes256-chr.ssh-key gen -b 1024 -f /etc/ssh_host_key - n '' chmod - - - /etc/ssh/ssh_config preventative control n=1024, 2048, 4096 chimed r w x (i. e. 4 2 1 ) – blank is nothing [ H, M, L ]
  • 4.  ISSN: 2302-4046 TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398 390 4. Existing in UFS Problem As per above data collection, the automated control (PDC) is not available of the recent RTOS. There is great risk on the corrective action & reaction on file system, application & resources on this current security age. The multiple Relation, Function, Operation and Services is happening over a multiple clients, business, application and resources on a complex heterogeneous IT infrastructure for all the time & every time. Therefore, resource conflicts are the biggest issue over a complex network, platform and user application. 5. Proposed Dynamic RWX ACM Model for Risk Optimization This paper contributes to the define and development of an optimal model that our objective to determine the minimal cost, quality & time to be invested into the risk assessment and management on the measure components of Unix file system attributes (Read, Write & Execute). That’s why we are calling as it RWX model for system based risk analysis. Furthermore, this mechanism optimize the cost, time & resources is supposed to reduce the system attack, down time and vulnerabilities. We have to optimize the technology & resource cost and maximizes the business (throughput). We have to protect our data and services to over a multiple business, resources & technology on all the time (24 x 7 x 52). Figure 3. Technology, Business & Resources Preventing Data & Services We have to implement our idea based on the SEMIGROUP (isomorphism graph) theory, how the operating system optimizing as per our business requirement. Our objective is that maximize our business (throughput) and minimizes our technology & resources cost and time. 5.1. Define We have to design & develop this optimization method based on Semi group. Like a semi group is a set with a binary operation but there is no requirement for an inverse function or an identity elements. In order to be a semi group, a set of objects plus an operation, must obey the following axioms. A semi group is important when we are looking at cosets.For all r, w, x € S, the equation ( r. w ) . x = r . (w. x) holds. For all p, d, c € S, the equation ( p . d ) . c = p . (d . c) holds [1-3]. PDC: Associative Low: (P U D) U C = P U ( D U C), (P ∩ D) ∩ C = P ∩ ( D ∩ C) Distributive Low: P U (D ∩ C) = (P U D) ∩ (P U C), P ∩ (D U C) = (P ∩ D) U (P ∩ C) RWX: Associative Low: (R U W) U X = R U ( W U X) , (R ∩ W) ∩ X = R ∩ ( W ∩ X) Distributive Low: R U (W ∩ X) = (R U W ) ∩ (R U X), R ∩ (W U X) = (R ∩ W) U (R ∩ X) Let us consider R={P, D, C} & M={R, W, X ). It is easy to verify that the following operation tables give Semi Group Structures for R & M respectively.
  • 5. TELKOMNIKA ISSN: 2302-4046  Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra) 391 We have to maintain the sequence as follows: 1st we have take care of the Prevent, 2nd Detect, then Correct. These three parameters should be satisfied according to our data & services for better performance & high security. The High Availability is Risk Mitigation. [K=PC+DC+CC ]. We can optimize the risk factor by help of these six elements. All these sixe elements depend on each others. Availabilities is the main concern among the all of them. As per business & resource management the PDC & RWX Model and Mechanism are very well suited for multiple RFOS & Technology in around the globe on 24 x 7 x 52 pattern. 5.2. Design This isomorphism sets of elements are equally satisfying to the transitive, union of, associative, distributive & composition and Sum of all for the Risk Mitigation. We are proposing this idea based on directed graph theory as follows. We have to design and develop the security & reliability policy for our complex IT infrastructure. We have to find out the best solution to applying step by step of algorithm, method, model & mechanism. We have to draw two identical directed graph one for PDC & another for RWX. The both of these two directed graph working for high availability on 24 x 7 x 52 pattern in around the security world as follows [1-3]. Figure 4. (a) [PDC] Figure 4. (b) [RWX] We can find the composition of the table as follow: Table 2. (a) [ PDCA ] Table 2. (b) [ RWXA ] X P C D A X R W X H P P C D A R R W X H C C P A D W W R H X D D A P C X X H R W A A D C P H H X W R Associative law: Multiplication is associative in G, since associative law holds in case of matrix multiplication: (PC) D = P (CD) Where A= Availability, H= High Availability. Let us onsider R={P,D,C} & M={R, W, X). It is easy to verify that the following operation table gives Semi Group Structures for R & M respectively. AN ISOMORPHISM GRAPH in Between M & R, f(p) = 1, f(d) = 6, f(c) = 8,f(a) = 3, f(c) = 5, f(i) = 2, f(a.t) = 4, f(h) =7.
  • 6.  ISSN: 2302-4046 TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398 392 Figure 5(a) Figure 5(b) 5.3. Development (Function) We have to move forward to finding alternate solution and algorithm for risk optimization on semi-group method. This scalable complex semi group method definitely will be solve our risk and security issue on complex real time system for multiple client application, business and resources available for multi- location on any time around the clock. We have to optimize the RTOS step by step as follows: Table 3. [ DPC ->RWX ] Model-1.a Prevention on Write Access DCP Verses RWX * D C P * R W X D D C P R X R i C C P D W R X P P D C X S X R Now write access is preventive stage. Prevention is better than cure. Diagonal view (P-P-P=W-W-W) BUSINESS OWNER et us consider that: f(D)=W, f(C)=R, f(P)=X. Now, replacing the function in R by their images and rearranging the tables, we obtain exactly the table for M. Thus R & M are Isomorphic. Therefore, this model is called“ SEMI- GROUP as well as ISOMORPHIC MODEL ON SYSTEM SECURITY FOR RISK OPTIMIZATION”. Then we can move forwards to the NEXT OPTIMIZED LEVEL as follows. Table 4. [ PDC ->RWX ] Model-1.b Detection on Write Access PDC Verses RWX * P D C * R W X P C P X X R IS D P M C W R X C D C P R S X R OPTIMIZED LEVEL NOW WRITE ACCESS IS DETECTIVE STAGE, Diagonal view (D-D-D=W-W-W) BUSINESS OWNER D W P P P W W W D D W W
  • 7. TELKOMNIKA ISSN: 2302-4046  Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra) 393 Table 5. [ DPC ->RWX ] Model-1.c Correction on Write Access DCP Verses RWX * D C P * R W X D P D C X X R S C D E P W R X P C P D R I X R NOW WRITE ACCESS IS CORRECTIVE STAGE. Diagonal view (C-C-C=W-W-W) BUSINESS OWNER Figure 6. Write Activities This graphical representation show that, WRITE ACCESS is prevented, detected and corrected automatically. Table 6. [ DCP ->RXW ] Model 2.a PREVENTION ON EXECUTE ACCESS DCP Verses RXW * D C P * R W X D D C R W R C C P D X R W P D C W W R NOW EXECUTE ACCESS IS PREVENTIVE STAGE (ANY BODY, ANY WHERE & ANY TIME PREVENTION IS BETTER THAN CURE. Diagonal view (P-P-P=X-X-X) OTHER. P P P X X W C I C C W W X
  • 8.  ISSN: 2302-4046 TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398 394 Table 7. [ PDC ->RXW ] Model:2.b DETECTION ON AUTHENTICATION PDC Verses RXW * P D C * R W X P C P R I R D P C X R S W C C P W W R OPTIMIZED LEVEL, NOW EXECUTE ACCESS IS DETECTIVE STAGE. Diagonal view (D-D-D=X-X-X) OTHER. Table 8. [ DCP ->RXW ] Model: 2.c CORRECTION ON AILABILITY DCP verses RXW * D C P * R W X D P D R W R C D P X C CC I P P D W i C NOW EXECUTE ACCESS IS CORRECTIVE STAGE, Diagonal view (C-C-C=X-X-X) OTHER Figure 7. Execute Activities This graphical representation show that, EXECUTE ACCESS is prevented, detected and corrected on the objects in automated way. Table 9. [ DCP ->WRX ] Model:3.a PREVENTION ON READ ACCESS DCP Verses WRX * D C P * W R X D D C W X W K C C D R W X P D C X X W NOW READ ACCESS IS PREVENTIVE STAGE. PREVENTION IS BETTER THAN CURE. Diagonal view (P-P-P=R-R-R) BUSINESS OWNER P P P R R R X D D D X X X X C C C X X
  • 9. TELKOMNIKA ISSN: 2302-4046  Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra) 395 Table 10. [ PDC ->WRX ] Model:3.b DETECTION MATRIX ON READ ACCES PDC Verses WRX * P D C * W R X P C P W X W K D P C R W X C C P X X W OPTIMIZED LEVEL DETECTING THE READ ACCESS . Diagonal view (D-D-D=R-R-R) BUSINESS OWNER Table 11. [ DCP->WRX ] Model: 3.c CORRECTION THE CONFIDENTIALITY DCP Verses WRX * D C P * W R X D P D W X W K C D P R W X P P D X X W NOW READ ACCESS IS CORRECTIVE STAGE Diagonal view (C-C-C=R-R-R) BUSINESS OWNER Figure 8. Read Activities This graphical representation shows that, READ is prevented, detected and corrected automatically. This is the dynamic life cycle of PDC & RWX based on the semi-group, isomorphic & directed graph theory. When RWX optimization technique applied on OS, the space & time complexity of Processor, Memory and users details can be detected by OS system parameters is already defined in existing risk assessment method on file system ( /var/adm/messages), then we can fix up the unix file system (UFS) as per availability of technology, resources and business requirement. In this way we can dynamically optimize our technology & business risk. We can conclude that from the above optimization model the operating system components are the shell, file, processor, memory & encryption key have to take highest priorities of the Preventive, Detective and Corrective, action plan, which is shown in the model 1, 2 & 3 respectively. In this way, we can improve the performance & security of the high end READ, WRITE and EXECUTE attributes for the technology, business & resources. The preventive control will be facilitate and resolve the various issue when it spans several jobs and applications are running simultaneously under heterogeneous complex based web D D D R R C C C R R R R
  • 10.  ISSN: 2302-4046 TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398 396 infrastructure (B2B, B2C, P2P, G2G ) in around the web world. These above optimization models will be very helpful for Instruction level parallelism for high end computing. We hope this theoretical and experimental idea will be very much help to the parallel computing environment to optimize the operating system software risk. We can improve our risk optimization model that, which will be help to the risk management on operating system. 5.4. Brief Summary of the Dynamic RWX ACM Model Table 12. Life Cycle of PDC & RWX Operation MODEL STAGE DESCRIPTION ACTION PLAN Model- 1.a Model- 1.b Model- 1.c 1 st Round: on Write Access Diagonal view (P-P-P=W-W- W) Diagonal view (D-D-D=W- W-W) Diagonal view (C-C-C=W- W-W) Preventive Control on Write Access Detective Control on Write Access Corrective control on Write Access Model- 2.a Model- 2.b Model- 2.c 2 nd Round: Execute Access Diagonal view (P-P-P-X-X- X) Diagonal view (D-D-D= X-X- X) Diagonal view (C-C-C= X-X- X) Preventive Control on Execute Access Detective Control on Execute Access Corrective control on Execute Access Model- 3.a Model- 3.b Model- 3.c 3 rd Round: Read Access Diagonal view (P-P-P=R-R- R) Diagonal view(D-D-D=R-R- R)) Diagonal view(C-C-C- R-R- R) Preventive Control on Read Access Detective Control on Read Access Corrective Control on Read Access Model- 1.c Model- 2.c Model- 3.c Automated Corrective Control Diagonal view (C-C-C-W-W- W) Diagonal view (C-C-C-X-X- X) Diagonal view(C-C-C-R-R- R) Corrective control on Write Access Corrective control on Executive Access Corrective control on Read Access 5.5. Deployment: (Test, Verification, Results & Services) Practical Implact Analysis on RWX ACM Model We have to verify & validated the operating system integrity, high availability, reliability, scalability, reliability of Read, Write & Execute Access over a UFS on RTOS. We have to protect, Detect and Correct the UFS per business, resource requirement and availability of technology. We have to apply some review method on internal UNIX operating system on super user mode. This table(3) is the part of benchmarking, performance analysis and risk assessment of real time operating system over a complex web portal application on large scale RTOS. Table 13. Verification of RTOS [8], [9] SN INPUT ( Subject ) How to do ? DESCRIPTIONS ACTION PLAN What to do? Risk Assessment OUTPUT (Object) What happen & When ?? 01 /var/adm/message System mesg ( event mgmt ) DC Date & time stamp SECONDARY RISK ASSESSMENT 02 /var/adm/syslog syslog system logs Detective control, Accountability & Authentication 03 /var/adm/sulog super user log Detective control, Accountability & Authentication 04 /var/adm/loginlog user login log Detective control, Accountability & Authentication 05 etc/ssh/sshd_config AES, CKM Key mgmt Run the scripts: Preventive control
  • 11. TELKOMNIKA ISSN: 2302-4046  Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System (P. K. Patra) 397 6. Results (Services) [Efficient Resource Management] The subject and object can able to mapping, synchronize and optimize through real time operating system. This virtual programming utilities and application will be more measurable and accountable for performance, fault tolerance, throughput, bench marking and risk assessment on any application over a complex IT infrastructure. How is behaving the (MIMD) UNIX server along with its sub components, when we are running on the different processor, memory & encryption key on the same programming & application or reverse way? The iostat, vmstat and pmstat commands will be give the full detail output statistics of processor and memory on real time operating system. The primary risk can be analysis on right time and right way. The /var/adm/message scripts will be give the output statistics of hardware and software problem of real time event management system including date and time stamp on unix machine. We can verify and validate the access control mechanism (ACM) by help of these scripts, which is already mentioned on table 13. (/var/adm/sulog, syslog, login log). a) How is the system behaving, when millions of users accessing the same piece of data & information in around the clock ( high availability, scalability and reliability). In this ways, we can improve the ACM, performance, benchmarking, fault tolerance and risk assessment at a time to utilizing the above scripts and virtualization concept, which is help to our business, technology and society in around the globe. b) Maximize the protection, detection & correction ( PDC ) at optimal cost and time. c) Maximize the performance, reliability, high availability at optimal cost (TQM ). d) Maximum utilization of resources at minimal cost at right time in right way. 7. Conclusion This dynamic RWX is a one of the best preventive control, which is providing accountability for individuals who are accessing sensitive information on shell, file system & kernel. The accountabilities is accomplished through access control mechanisms (ACM) that require identification, authentication, authorization, accountability, non-repudiation, availability, reliability & integrity through the audit function on various file system. The large scale optimization can be done in this way to protect, detect & correct the RWX model for efficient resource management in a dynamic way of the web application over a RTOS. A sound information security policy identifies prevention, detection, and response measures on various components of system security. This above model provides more details on risk assessment tools and practices that may be used to improve information security programs. The preventive measures may include regularly using vulnerability assessment tools and conducting periodic penetration analyses. Intrusion detection tools can be effective in detecting potential intrusions or system misuse. Our research & development should also develop a response. By reading through this paper and utilizing the model & mechanism for preventive, detective and corrective action plan of the organization is a great benefits. The security programmer & administrator now have a base knowledge of security, server hardening, intrusion detection, auditing and security tools. This knowledge can be directly applied to their servers and many vulnerable holes will now be filled. Therefore, it is critical that every unix security-minded programmer maintains their knowledge of security by researching and referring to the Internet resources that have been mentioned in survey data collection. If there is ever a question about updating & implementation of any of the suggested features, refer to the OS server security manuals that were designated with the specified feature (all features have been research, design, developed & documented). References [1] Bernard, Kolman. Discrete Mathematical Structures. New Delhi, India: Person Education India (PHI). 2007. [2] Edgar G. Discrete Mathematics with Graph Theory. New Delhi, India: Person India (PHI). 2007. [3] Joe L Matt. Discrete Mathematics for Scientist and Mathematician. New Delhi, India: Person Education India (PHI). 2008. [4] Hwang, Kai. Advance Computer Architecture. New Delhi, India: Tata McGraw Hill. 2008 [5] O’ Reilly. Essential of System Administration. O’ Reilly Media: USA. 1995. [6] Shon, Harrish. CISSP Exam study guide, New Delhi, India: Dreamtech. 2002 [7] Shon, Harrish. Security Management Practices. New Delhi, India : Wiley Publishing Inc. 2002
  • 12.  ISSN: 2302-4046 TELKOMNIKA Vol. 13, No. 2, February 2015 : 387 – 398 398 [8] Sumitabh Das. UNIX System V UNIX Concept & Application. Delhi, India: Tata McGraw Hill.2009. [9] Sun-Microsystem. UNIX Sun Solaris system administration. USA. 2002. [10] Weber, Ron. Information System Control & Audit. New Delhi, India: Person Education India (PHI). 2002.