Preview

Linux Security Lab 2

Satisfactory Essays
Open Document
Open Document
304 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Linux Security Lab 2
1. What is the significance of creating Groups and adding Users to Groups?
By creating groups you can get people access to the information that they need to get to. When a user is created and added to a group that user then has the access permissions of the group that has been made.
2. Given a scenereo where there are 5 database admins that may periodically need access to a given system. Discuss a better concept to better manage the admins access permissions.
Break down admin responsabilities and only give them the access for what duties they need to perform. PAM command is a great idea in this scenereo.
3. New web admin account has been set up and a password provided. What is the command to force a password change upon login.
Chage –d 0
4. What is the purpose of the “SU” command.
This is the command to get into the machine as ROOT. (Super User I like to call it) this is like the ultimate authority command to change what you want and equally allows you to screw things up if you want.
5. Restricting the use of the “SU” command can be configured using what mechanism.
/etc/pam.d/su to edit the PAM. Edit the #auth required pam_wheel.so use_uid
6. What is the purpose of the login.defs file? Creates accounts and is site specific for the shadow login. This has rules like expirations, password requirements.
7. What is the PASS_MIN_DAYS setting? Min days until you have to change the password
8. What is the PASS_MAX_DAYS setting? Why is it good to set this? Max days to change your password. This is a great idea to force people to change passwords and if they don’t then the account goes bye bye.
9. NO
10. Make group, use login.defs, set max days

You May Also Find These Documents Helpful

  • Satisfactory Essays

    7. How is the passwd file used, and what fields make up its content? Explain.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.) Change control manager enforces change of things passwords. Password change policies makes things difficult for hackers. It’s Brute force attack.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Com 135 Week 5 Analysis

    • 678 Words
    • 3 Pages

    Check the user's password strength. Use the Week 3 You Decide as the data for this section.…

    • 678 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    BAT1 Task 1

    • 1871 Words
    • 8 Pages

    c) There should be restrictions on the passwords created by users with regards to complexity, maximum and minimum duration of the password, history of the password etc. Login information should be changed once in three months to keep…

    • 1871 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Authorization Rules: Controls will be configured to ensure access is approved for only company/corporate employees. These controls will be set up based off of the position (job roles) of the employees to ensure they can only access what is required to allow them to perform their duties. The policy will include group membership policies as well as authority-level policies. The employee access will be assigned to the appropriate groups and authority- level policies.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Don’t use common words, phrases, keyboard or sequential patterns as passwords. It is risky. Online criminals and hackers could potentially gain access to your accounts with such…

    • 599 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    2. What two access controls can be setup for a Windows Server 2003 folders and authentication?…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Click the link below to obtain your username or to get a new password.…

    • 1335 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Project Proposal for Cms

    • 500 Words
    • 2 Pages

    On a network, access to databases is dependent upon the number of Users with User ID's and protected passwords.…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country, it should be very apparent why an organization like NSA had such an interest in heading up development of a more secure way to better protect our nation’s computer systems. In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting.…

    • 1126 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Role Mining - Revealing Business Roles for Security Administration using Data Mining Technology Martin Kuhlmann Dalia Shohat SYSTOR Security Solutions GmbH Hermann-Heinrich-Gossen-Strasse 3 D 50858 Cologne [martin.kuhlmann|dalia.shohat] @systorsecurity.com Gerhard Schimpf SMF TEAM IT-Security Consulting Am Waldweg 23 D 75173 Pforzheim Gerhard.Schimpf@smfteam.de ABSTRACT In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems. The core of this paper creates a link between the use of well established data mining technology and RBAC. We present a process for detecting patterns in a data base of access rights and for deriving enterprise roles from these patterns.…

    • 5822 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    User setup and passwords are maintained by the Systems Support Team (please contact telephone number Customer Services 01332 868900) please see: Figure 8. Password Maintenance…

    • 539 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Tally 7

    • 881 Words
    • 4 Pages

    This option allows you to alter information about the existing company, you can modify any information at any time that is set while creating a company.…

    • 881 Words
    • 4 Pages
    Good Essays

Related Topics