Previous Topic: Why Does UNIX Need Protecting?

Next Topic: What Is Protected?


How Does This Work?

In addition to supplying the regular security functions-such as an access rule database, an audit log, and administration tools-CA Access Control intercepts the operating system events that are to be protected. Since CA Access Control has to work with many different operating systems, it intercepts events in memory. No changes are made to system files, and the operating system is not modified at all.