* Project: Linux – Based Web Application Infrastructure
* Project: Logistics
* Project Part 3: Executive Summary
* Project Part 3: Tasks 1 * Project Part 3: Tasks 2 * Project Part 3: Tasks 3
IS-418: Security Strategies in Linux Platforms and Applications
* Project: Linux – Based Web Application Infrastructure
* Project: Logistics
* Project Part 3: Executive Summary
* Project Part 3: Tasks 1 * Project Part 3: Tasks 2 * Project Part 3: Tasks 3
Task 1: Use a Kernel
Scenario:
First World Bank Savings and Loan's Linux-based infrastructure requires an in-house custom kernel or a kernel provided by a vendor
Tasks: * You need to:
* Make recommendations whether the organization should use a custom kernel * Compile stock kernels from sources, or use a vendor-supplied kernel * Explain the pros and cons of each of the kernel options and support your recommendations with a valid rational
I have recommended the appropriate kernel that can be used by the organization:
File system
Like all UNIX systems, its file system is based on one root directory, or hierarchical top point with subdirectories underneath it. Some sub-directories act as mount points, where different physical or networked file systems may be incorporated.
The hardware is also incorporated into the file hierarchy. Device drivers interface to user applications via an entry in the /dev directory. Process information as well is mapped to the file system through the /proc directory.
Unix security systems were designed into the architecture. Raw hardware devices are protected from direct access, and the file system has an inbuilt security system giving individual access to files on three levels, user only, group membership, and world access. Each category has read, executable and write flags that may be set in any combination. Kernel -or- System
Cited: I. Jang, Michael H.. Security strategies in Linux platforms and applications. Sudbury, MA: Jones & Bartlett Learning, 2011. Print.