Preview

Linux Security

Satisfactory Essays
Open Document
Open Document
449 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Linux Security
IS3440 Final Exam Review
IS3440 Final Exam Review

skong@itt tech.edu skong@itt‐tech.edu CIA triad
CIA triad

Remote Access
Remote Access

Virtualization

OSSTMM

WINE

Access control
Access control

Authentication Databases
Authentication Databases

Firewall support
Firewall support

/etc/sudoers

/etc/passwd

/etc/login.defs

PAM

Edit /etc/sudoers
Edit /etc/sudoers file

FHS

FHS recommended to locate configuration files in the /etc/ path

FHS

/etc/fstab

Samba

Encrypted Partitions and Volumes
Encrypted Partitions and Volumes

filesystem quota

chroot Jail
Use chroot jail:
• To enable an application access its own set of
To enable an application access its own set of libraries and directory structure
• T
To restrict access to users on a system ti t t t
• To run software such as Berkeley Internet
Name Domain (BIND)

Bastion Hosts
Only has access to the one server and service

H
Black‐hat hacker exploits a bug in the
Simple Mail Transfer
Protocol (SMTP)
Protocol (SMTP)
Server
Now has access
Now has access to all the server services Web Server

Database Server

Bastion Hosts
Bastion Hosts

SMTP Server

Multipurpose Server li S

Common Network Services Software
File Sharing g Samba
Has built‐in interoperability with
Windows clients

Network File System (NFS)
Generally faster than Samba when transferring large files

Can be set up as a member server Easy to set up in Windows environment in Windows environment
Has username/password authentication Authentication is Internet Protocol
(IP)‐based; however, it can support
Kerberos
Can configure to squash root
Can configure to squash root

ssh

Security Considerations for the Linux
Desktop
p
• Turn off the X Display Manager Control p y g Protocol (XDMCP).
• Keep only those productivity tools that are
Keep only those productivity tools that are

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1210 Network Essay

    • 618 Words
    • 3 Pages

    3 types of servers are FTP, web, and application server. A file transfer protocol server is used to secure transfer files between 2 computers while providing ease of use (transfer protocols). A web server serves content to the web browser and allows the content to be displayed on user web browsers, all done with the aid of http. Lastly, an application server hold a lot of data that connect to the both the user and a database usually to access data, update data or remove data.…

    • 618 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 9

    • 474 Words
    • 2 Pages

    C) FTP (File transfer protocol) - is a standard way of gathering files between computers on the Internet over IP/TCP…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks,…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Linux Hw

    • 287 Words
    • 2 Pages

    What kind of server repond to recursive queries ? how does this server work ?…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Perform a risk assessment. Perform a risk assessment. Fill out the control table for Classic Catalog Company…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. There is a proper management of files because they are stored at the same place; files are easier to find.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    How to reduce the attack surface with what hardening steps and network security management best practices, (100) 2) ensure secure authentication, authorization, and accounting, (100) and 3) prevent or respond to intrusions. (100)…

    • 310 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    infromation security

    • 541 Words
    • 3 Pages

    The fact that the company's position of VOIP2.biz is a very difficult and very spiky to the lack of support or facilities or external funders to ensure the functioning of the company in the right direction, pace and confident. With the Executive Director to develop two plans and the division of each plan in two phases, but the regulations of the state and the policy of monopoly and the large size of the expenditure and income of vulnerable and interest, as described in the economic feasibility of the project has failed, unfortunately, must be in place a contingency plan to save the company. As is well known the field of finance and business , it does not have the only solution , but there are the best solution which is the situation in which the best so get out the least possible losses and costs in innovative ways and smart through the Executive Director, a seasoned expert in risk management and the company VOIP2.biz considered a good model for many companies entering the market and is located in a critical position and a person must have sufficient expertise to save the critical situation.…

    • 541 Words
    • 3 Pages
    Satisfactory Essays