IS3440 Final Exam Review
skong@itt tech.edu skong@itt‐tech.edu CIA triad
CIA triad
Remote Access
Remote Access
Virtualization
OSSTMM
WINE
Access control
Access control
Authentication Databases
Authentication Databases
Firewall support
Firewall support
/etc/sudoers
/etc/passwd
/etc/login.defs
PAM
Edit /etc/sudoers
Edit /etc/sudoers file
FHS
FHS recommended to locate configuration files in the /etc/ path
FHS
/etc/fstab
Samba
Encrypted Partitions and Volumes
Encrypted Partitions and Volumes
filesystem quota
chroot Jail
Use chroot jail:
• To enable an application access its own set of
To enable an application access its own set of libraries and directory structure
• T
To restrict access to users on a system ti t t t
• To run software such as Berkeley Internet
Name Domain (BIND)
Bastion Hosts
Only has access to the one server and service
H
Black‐hat hacker exploits a bug in the
Simple Mail Transfer
Protocol (SMTP)
Protocol (SMTP)
Server
Now has access
Now has access to all the server services Web Server
Database Server
Bastion Hosts
Bastion Hosts
SMTP Server
Multipurpose Server li S
Common Network Services Software
File Sharing g Samba
Has built‐in interoperability with
Windows clients
Network File System (NFS)
Generally faster than Samba when transferring large files
Can be set up as a member server Easy to set up in Windows environment in Windows environment
Has username/password authentication Authentication is Internet Protocol
(IP)‐based; however, it can support
Kerberos
Can configure to squash root
Can configure to squash root
ssh
Security Considerations for the Linux
Desktop
p
• Turn off the X Display Manager Control p y g Protocol (XDMCP).
• Keep only those productivity tools that are
Keep only those productivity tools that are