Preview

Unit 1&2 Discussion

Satisfactory Essays
Open Document
Open Document
379 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1&2 Discussion
Unit 1 Discussion 1: Securing a Linux System
Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be compromised based purely on a poor security configuration. Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers such as a WAF, IDS, or Mod Security to react in real time to various hacking and threats for HTTP requests. However, securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised. Default operating system installations and configurations, are not secure. In a typical default installation, many network services which won’t be used in a web server configuration are installed, such as remote registry services, print server service, RAS etc. The more services running on an operating system, the more ports will be left open, thus leaving more open doors for malicious users to abuse. Switch off all unnecessary services and disable them, so next time the server is rebooted, they are not started automatically. Switching off unnecessary services will also give an extra boost to your server performances, by freeing some hardware resources.

Unit 2 Discussion 1: Identifying Layers of Access Control in Linux
Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.

For example a 2-bit, access control level (levels 0 to 3) would typically be

You May Also Find These Documents Helpful

  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The most ideal method for diminishing dangers against a server is by part the web server from the server database and other application servers. Since the web server has a direct association with the web makes it the principle focus to obtain entrance to the network. Touchy data, similar to customer records, passwords, charge card numbers, and government disability numbers ought not be put away on the web server. Switches permit data to go forward and backward between networks. Having a switch at every area will permit information to stream between all areas. Switches inspect each bundle of data on the network and figure out where it ought to be sent and guides it there. Switches utilize a setup table to figure out where associations strive for steering information, needs for directing information to specific associations, and principles for taking care of the information. Firewalls are likewise added or joined with switches to give more security to the network and information put away. Firewalls act like a channel between a network, or a PC, and the Internet. Firewalls can be arranged to keep representatives from sending particular sorts of messages and exchanging information off the network. They can likewise be set up to wipe out access to certain sites on the Internet, for instance any informal communication locales like Facebook and Twitter. One vital occupation they perform is halting PCs outside the network from getting to PCs on the network.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    First of all, since Linux is mostly an open-source type of software running server, it is very vulnerable to any kinds of attacks, or as Linux calls them, crackers. Many malicious attacks on Linux and related applications will also grow. The Web Server isn’t much of a risk because but it is still an important software that can have a high risk of being attacked because it’s known as an open-source, so having any personal information stored inside it, can be at risk of being exposed to a cracker (hacker).…

    • 364 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit Two

    • 307 Words
    • 1 Page

    1. What is a pinhole camera? How do we know that these devices existed before the nineteenth century?…

    • 307 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    2. An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    UNIT 2

    • 470 Words
    • 3 Pages

    5.) Write the pseudocode for a program that will determine the average miles per gallon a car gets. (Inputs should be miles driven and gallons of gas used)…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    6. What are some options according to PCI DSS to protect external facing web applications from known attacks?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit Two

    • 579 Words
    • 2 Pages

    2. What type of recording do you think would be the most useful to crime…

    • 579 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 1

    • 1725 Words
    • 7 Pages

    1. Identify four main points that would be included in a contract of employment. If possible, use an example contract to support your answer (feel free to obscure any confidential information).…

    • 1725 Words
    • 7 Pages
    Good Essays
  • Good Essays

    unit 1

    • 641 Words
    • 2 Pages

    Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Good Essays

    unit 1

    • 367 Words
    • 2 Pages

    1. Identify four main points that would be included in a contract of employment. If possible, use an example contract to support your answer (feel free to obscure any confidential information).…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 2

    • 2029 Words
    • 5 Pages

    Unit 2 – Introduction to personal development in health, social care or children's and young people's settings…

    • 2029 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 1

    • 929 Words
    • 3 Pages

    It is vitally important for me as a teacher to keep up to date with legislation and any changes made to legislation. I will start with explaining what the difference is between a legislative requirement and a code of practice. A legislative requirement is a duty to act according to the law as defined in an Act of Parliament and is usually enforceable through the courts. Code of Practice is a set of rules outlining how a person in a particular profession is expected to behave. Finally a Statutory code of practice is a Code of practice approved by Parliament and admissible as evidence in any legal action.…

    • 929 Words
    • 3 Pages
    Good Essays