Preview

Linux Security

Powerful Essays
Open Document
Open Document
7689 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Linux Security
Contents

1. Introduction 1
1.1 Problem Statement 1
1.2 What Is Security? 1
1.3 OS Protection and Security 2
1.4 Assets and their Vulnerabilities 2
1.5 Protection 3
1.6 Intruders 3
1.7 Malicious Software 3
1.8 Trusted Systems 4
1.9 Protection and Security Design Principles 4
1.10 The Unix/Linux Security Model 5
1.10.1 Properties of the Unix Superuser 5
1.10.2 The Unix Security Model — Groups 6
1.10.3 Protection For Unix Files and Directories 6
1.10.4 The Meaning of Permissions 6
1.10.5 Changing File and Directory Permissions 7
1.11 Access control lists (ACLs) 8
1.11.1 Access Tokens and User Rights 8
1.11.2 The Discretionary Access Control List 8
1.11.3 The System Access Control List 9
2. Background and Motivation 10
2.1 Background 10
2.2 What is Clustering? 10
2.2.1 Advantages of clustering 11
2.2.2 Applications of Clustering 11
2.2.3 Getting Started With Linux Cluster 11
2.2.4 Cluster Components 11
2.3 Motivation 12
3. Literature Survey 13
3.1 Security Models 13
3.1.1 Access Control Matrix 13
3.1.2 Bell-La Padula 14
3.1.3 GFAC 14
3.1.4 Domain and Type Enforcement 15
3.1.5 FLASK 16
3.1.6 DSI 17
3.2 Security Mechanisms 17
3.2.1 Discretionary Access Control 18
3.2.2 Mandatory Access Control 18
3.2.3 Role-Based Access Control 18
3.2.4 Reference Monitor 18
3.3 Other Concepts 19
3.3.1 Separation of Mechanism and Policy 19
4. Implementation 20
4.1 System Design 20
4.2 Hardware And Software Requirement 20
4.2.1 Software requirement 21
5. Conclusion 22
References 23

List of Tables and Figures
Table 3.1: Example of an access control matrix with two subjects and two objects

Figure 3.1: Overview of the Generalized Framework for Access Control (GFAC) architecture
Figure 3.2: Overview of the Flux Advanced Security Kernel (FLASK) architecture
Figure 4.1 System Model for security module

1. Introduction
1.1 Problem Statement
Traditionally, the telecom industry uses clusters to meet its carrier-grade

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Linux Hw

    • 287 Words
    • 2 Pages

    What kind of server repond to recursive queries ? how does this server work ?…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    While there are many threats out there today many of these threats are almost always targeted towards anything to do with business and money because they are always looking to gain free access to money sources or a way to steal things from companies or customers who have done business with them in the past. I am going to choose a local Company which is a very big store chain here in my state and a good many other states around the area, it is called Wal-Mart, they offer everything from car parts, food, pet supplies, normal supplies for daily use, electronics, clothes, just about anything you can imagine they have it and along with an online store as well to ship from other stores or to ship to homes.…

    • 1196 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Security Assessment

    • 856 Words
    • 3 Pages

    If I were to be hired as a consultant to perform a network security assessment for a large firm, there are a few things that I would have to keep in mind to provide my client with the best outcome possible. I would fist begin by explaining what a security risk assessment is to the client. I will explain that the security risk assessments that will be utilized is basically used to recognize the chance that there is an openness that can be exploited in their IT systems. We will begin by first determining the likelihood that a threat such as a hacker or an error will try to abuse the weakness and then determining the probability that the attempt will be successful.…

    • 856 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Software Security

    • 4565 Words
    • 19 Pages

    Proceedings of the 10th Colloquium for Information Systems Security Education University of Maryland, University College Adelphi, MD June 5-8, 2006…

    • 4565 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Ada tiga macam firewall yang dapat dimodifikasi: input (menyatakan paket yang memasuki sistem Linux anda), output (menyatakan paket yang keluar dari Linux anda), dan forward (menyatakan paket yang melalui Linux anda).…

    • 2062 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Linux:introduction

    • 904 Words
    • 4 Pages

    Linux and its Application1 Sunil Bhooshan Introductory Importance of Linux ... The File System Basic File Utilities Linux and its Application-1 Sunil Bhooshan Department of ECE JUIT Linux and its Application1 Outline Sunil Bhooshan Introductory Importance of Linux ... 1 Introductory 2 Importance of Linux ... 3…

    • 904 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Security Concerns

    • 9355 Words
    • 31 Pages

    According to Walter Lippman,” A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able, if challenged to maintain them by war”. Security as a concept is a subject of interpretations. The term security is always relative, contextual and situational. Interestingly enough, the security of one nation tends to generate the feeling of insecurity among others. Pakistan’s…

    • 9355 Words
    • 31 Pages
    Powerful Essays