Preview

Is418 Project 1-2-3

Better Essays
Open Document
Open Document
1343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is418 Project 1-2-3
IS-418: Security Strategies in Linux Platforms and Applications

* Project: Linux – Based Web Application Infrastructure

* Project: Logistics

* Project Part 3: Executive Summary

* Project Part 3: Tasks 1 * Project Part 3: Tasks 2 * Project Part 3: Tasks 3
IS-418: Security Strategies in Linux Platforms and Applications

* Project: Linux – Based Web Application Infrastructure

* Project: Logistics

* Project Part 3: Executive Summary

* Project Part 3: Tasks 1 * Project Part 3: Tasks 2 * Project Part 3: Tasks 3

Task 1: Use a Kernel

Scenario:
First World Bank Savings and Loan's Linux-based infrastructure requires an in-house custom kernel or a kernel provided by a vendor

Tasks: * You need to:

* Make recommendations whether the organization should use a custom kernel * Compile stock kernels from sources, or use a vendor-supplied kernel * Explain the pros and cons of each of the kernel options and support your recommendations with a valid rational

I have recommended the appropriate kernel that can be used by the organization:
File system
Like all UNIX systems, its file system is based on one root directory, or hierarchical top point with subdirectories underneath it. Some sub-directories act as mount points, where different physical or networked file systems may be incorporated.
The hardware is also incorporated into the file hierarchy. Device drivers interface to user applications via an entry in the /dev directory. Process information as well is mapped to the file system through the /proc directory.
Unix security systems were designed into the architecture. Raw hardware devices are protected from direct access, and the file system has an inbuilt security system giving individual access to files on three levels, user only, group membership, and world access. Each category has read, executable and write flags that may be set in any combination. Kernel -or- System



Cited: I. Jang, Michael H.. Security strategies in Linux platforms and applications. Sudbury, MA: Jones & Bartlett Learning, 2011. Print.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1430 Unit 2 Discuss

    • 401 Words
    • 2 Pages

    The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the filesystem hierarchy used in the GNU/Linux operating system. When targeting Linux as a platform, application developers want to have some assurance that the code they write on one Linux distribution will run on other Linux distributions without having to go through extra effort. This matches their experiences on other popular platforms, such as Windows or Mac OS X. In addition, application developers want to ensure that the platform as a whole does not diverge. Even if an application works on today's distributions, will it work on tomorrow's? The LSB workgroup has, as its core goal, to address these two concerns. We publish a standard that describes the minimum set of APIs a distribution must support, in consultation with the major distribution vendors. We also provide tests and tools which measure support for the standard, and enable…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Telecoms has not been updated in 15 years and is not integrated with customer service database to improve call management efficiency…

    • 782 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    In this lab, you practiced properly securing a Linux server system. You performed the steps to secure the bootloader, enable iptables, and run SELinux to help lock down the Linux OS. You also applied ACLs to directories and files to secure file and data access and then checked those ACLs and permissions on the system.…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Cited: Jang, M. (2011). Security Strategies in Linux Platforms and Applications. Jones & Bartlett Learning.…

    • 295 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column.…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Explore and Discuss

    • 1383 Words
    • 6 Pages

    C.1.a) POSIX - a family of standards specified by the IEEE for maintaining compatibility between operating systems.…

    • 1383 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. For the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file, UNIX was used. Each user would have a masked entry that will specified if the user is allow to do anything to the…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    7. What is a shell? How does it work with the kernel? With the user?…

    • 392 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CISSH

    • 1734 Words
    • 7 Pages

    You need to download the cissh distribution file from Blackboard. There is a zip file,…

    • 1734 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Dbms

    • 318 Words
    • 2 Pages

    Physical view - how and where the data are physically arranged and stored on storage medium…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The basic or simple file system for UNIX is the UNIX File System, or UFS. It’s sometimes called the Berkeley Fast File system. All data in UNIX is organized into files. All files are organized into directories. These directories are organized into a tree-like structure called the filesystem. It started the concept of inodes which contain the metadata that describes a file. Every inode describes one file. It refers to the directory tree or the arrangement of files on disk partitions. Below is a basic UNIX file system directory (Frisch, 2002).…

    • 1312 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    LINDUSEMBEDDED. 2010. Android Linux kernel additions. [online]. [Accessed 28 September 2012]. Available from World Wide Web: <http://www.lindusembedded.com/blog/2010/12/07/android-linux-kernel-additions/>…

    • 3993 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Red Hat Enterprise

    • 50613 Words
    • 203 Pages

    Copyright © 2012 Red Hat, Inc. and others. T he text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux® is the registered trademark of Linus T orvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners. 1801 Varsity Drive Raleigh, NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701…

    • 50613 Words
    • 203 Pages
    Powerful Essays
  • Good Essays

    Linux

    • 662 Words
    • 3 Pages

    Launched in 1996, Linux 2.0 had 41 releases in the series; inclusion of critical operating system features and rapid releases helped to make the Linux operating system the OS of choice for IT professionals. Another notable moment in Linux history was the release of Version 2.4 which contained support for USB, PC Cards, ISA Plug and Play and Bluetooth, just to name a few; these features demonstrated the versatility and the advancement of the Linux kernel since the early days of Version 1.0.0 (Hayward, 2012).…

    • 662 Words
    • 3 Pages
    Good Essays