Traditional Unix security model Root is god Certain actions require root privileges Binding low ports (<1024) Configuring network interfaces Mounting/unmounting filesystems Changing kernel parameters Loading kernel modules Accessing raw devices Suid/Sgid bits created to allow normal users to access privileged resources.