Preview

Linux System Administration Wa 1

Satisfactory Essays
Open Document
Open Document
783 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Linux System Administration Wa 1
Jennifer Howe
WA 1

Comparing Linux Security Applications
Introduction
The pervasive adoption of the Linux operating system has led to a proliferation of new security tools and applications for ensuring the security of systems and applications. The intent of this analysis is to evaluate chroot jail, iptables and SELinux. These three security technologies are evaluated from the standpoint of which organizations were behind their development, in addition to an explanation of how each technology changes the Linux operating system to make it more secure. Finally the types of threats that each of the technologies is designed to eliminate is also discussed.
Analysis of chroot jail
The chroot jail command was developed and first introduced during the initial development of the Unix Version 7 operating system in 1979 to ensure that users of UNIX-based workstations could still navigate to the highest levels of directories on their systems. The Berkeley System Division (BSD) versions of UNIX were very popular in the 1982 timeframe, immediately began using this command as a means to protect the rapidly expanding number of accounts on this operating system.
The chroot jail command was designed to provide user account-level access to the /home/user directory. Without this command in place, any user would be able to navigate to the very top of the /user tree structure and view any account and its contents they chose to. It also protected the entire file system for unwanted access and access across all system resources and programs as well., The developers of this command specifically looked at how to create a more effective strategy for managing user accounts and eradicating the threat of a single hacker gaining access to every user account on a Unix, and now Linux-based system (Rooney, 2004). The command has since become pervasively used for creating development “sandboxes” that define specific test regions on Linux systems that are protected from errant

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 7 Chapter Exercises

    • 458 Words
    • 3 Pages

    References: Sobell, Mark G. A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, 6th Edition. Prentice Hall, 2012. VitalBook file.…

    • 458 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 3 Lab Report

    • 1967 Words
    • 8 Pages

    This lab consists of two parts. Make sure you label each section accordingly and answer all the questions.…

    • 1967 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    In this lab, you practiced properly securing a Linux server system. You performed the steps to secure the bootloader, enable iptables, and run SELinux to help lock down the Linux OS. You also applied ACLs to directories and files to secure file and data access and then checked those ACLs and permissions on the system.…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Cited: Jang, M. (2011). Security Strategies in Linux Platforms and Applications. Jones & Bartlett Learning.…

    • 295 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    |Comments on security |Linux can use firewalls, IPS, IDS, and antivirus software. It can also be configured to |…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Explore and Discuss

    • 1383 Words
    • 6 Pages

    C.1.a) POSIX - a family of standards specified by the IEEE for maintaining compatibility between operating systems.…

    • 1383 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    linux

    • 456 Words
    • 2 Pages

    1. What change is necessary to make sendmail listen to all network traffic on port 25? What file would you edit?…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Linux Course Project

    • 2602 Words
    • 11 Pages

    References: Bodnar, L. (2005, October 5). A Look at EnGarde Secure Linux 3.0. Retrieved from http://lwn.net/Articles/154522…

    • 2602 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Linux Hw

    • 287 Words
    • 2 Pages

    What kind of server repond to recursive queries ? how does this server work ?…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    final exam

    • 1020 Words
    • 5 Pages

    TCO (6) ____ creates the root of the directory structure and the file system for use.…

    • 1020 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap to unauthorized entry. An advantage UNIX seems to have is its’ lack of popularity, a piece of security in itself, most malicious activity is aimed at the ever-growing Windows empire.…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    References: Bishop, M. (n.d.). File Protection in UNIX. ucdavis.edu. Retrieved May 10, 2013, from http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC4QFjAA&url=http%3A%2F%2Fnob.cs.ucdavis.edu%2Fbishop%2Fpapers%2F1987-decpro%2Ffilepro.ps&ei=gqORUZzGGem70gHX0oGICw&usg=AFQjCNFkWp7ekP675HOm2Y0er8g4-HKerg&bvm=bv.46471029,d.dmQ…

    • 716 Words
    • 3 Pages
    Good Essays