Preview

Linux Security

Powerful Essays
Open Document
Open Document
7689 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Linux Security
Contents

1. Introduction 1
1.1 Problem Statement 1
1.2 What Is Security? 1
1.3 OS Protection and Security 2
1.4 Assets and their Vulnerabilities 2
1.5 Protection 3
1.6 Intruders 3
1.7 Malicious Software 3
1.8 Trusted Systems 4
1.9 Protection and Security Design Principles 4
1.10 The Unix/Linux Security Model 5
1.10.1 Properties of the Unix Superuser 5
1.10.2 The Unix Security Model — Groups 6
1.10.3 Protection For Unix Files and Directories 6
1.10.4 The Meaning of Permissions 6
1.10.5 Changing File and Directory Permissions 7
1.11 Access control lists (ACLs) 8
1.11.1 Access Tokens and User Rights 8
1.11.2 The Discretionary Access Control List 8
1.11.3 The System Access Control List 9
2. Background and Motivation 10
2.1 Background 10
2.2 What is Clustering? 10
2.2.1 Advantages of clustering 11
2.2.2 Applications of Clustering 11
2.2.3 Getting Started With Linux Cluster 11
2.2.4 Cluster Components 11
2.3 Motivation 12
3. Literature Survey 13
3.1 Security Models 13
3.1.1 Access Control Matrix 13
3.1.2 Bell-La Padula 14
3.1.3 GFAC 14
3.1.4 Domain and Type Enforcement 15
3.1.5 FLASK 16
3.1.6 DSI 17
3.2 Security Mechanisms 17
3.2.1 Discretionary Access Control 18
3.2.2 Mandatory Access Control 18
3.2.3 Role-Based Access Control 18
3.2.4 Reference Monitor 18
3.3 Other Concepts 19
3.3.1 Separation of Mechanism and Policy 19
4. Implementation 20
4.1 System Design 20
4.2 Hardware And Software Requirement 20
4.2.1 Software requirement 21
5. Conclusion 22
References 23

List of Tables and Figures
Table 3.1: Example of an access control matrix with two subjects and two objects

Figure 3.1: Overview of the Generalized Framework for Access Control (GFAC) architecture
Figure 3.2: Overview of the Flux Advanced Security Kernel (FLASK) architecture
Figure 4.1 System Model for security module

1. Introduction
1.1 Problem Statement
Traditionally, the telecom industry uses clusters to meet its carrier-grade

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks,…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Linux Hw

    • 287 Words
    • 2 Pages

    What kind of server repond to recursive queries ? how does this server work ?…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Linux Security

    • 449 Words
    • 2 Pages

    IS3440 Final Exam Review IS3440 Final Exam Review skong@itt tech.edu skong@itt‐tech.edu CIA triad CIA triad Remote Access Remote Access Virtualization OSSTMM WINE Access control Access control Authentication Databases Authentication Databases Firewall support Firewall support /etc/sudoers /etc/passwd /etc/login.defs PAM Edit /etc/sudoers Edit /etc/sudoers file FHS FHS recommended to locate configuration files in the /etc/ path FHS /etc/fstab Samba Encrypted Partitions and Volumes Encrypted Partitions and Volumes…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    While there are many threats out there today many of these threats are almost always targeted towards anything to do with business and money because they are always looking to gain free access to money sources or a way to steal things from companies or customers who have done business with them in the past. I am going to choose a local Company which is a very big store chain here in my state and a good many other states around the area, it is called Wal-Mart, they offer everything from car parts, food, pet supplies, normal supplies for daily use, electronics, clothes, just about anything you can imagine they have it and along with an online store as well to ship from other stores or to ship to homes.…

    • 1196 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The pervasive adoption of the Linux operating system has led to a proliferation of new security tools and applications for ensuring the security of systems and applications. The intent of this analysis is to evaluate chroot jail, iptables and SELinux. These three security technologies are evaluated from the standpoint of which organizations were behind their development, in addition to an explanation of how each technology changes the Linux operating system to make it more secure. Finally the types of threats that each of the technologies is designed to eliminate is also discussed.…

    • 783 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Security Assessment

    • 856 Words
    • 3 Pages

    If I were to be hired as a consultant to perform a network security assessment for a large firm, there are a few things that I would have to keep in mind to provide my client with the best outcome possible. I would fist begin by explaining what a security risk assessment is to the client. I will explain that the security risk assessments that will be utilized is basically used to recognize the chance that there is an openness that can be exploited in their IT systems. We will begin by first determining the likelihood that a threat such as a hacker or an error will try to abuse the weakness and then determining the probability that the attempt will be successful.…

    • 856 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Software Security

    • 4565 Words
    • 19 Pages

    Proceedings of the 10th Colloquium for Information Systems Security Education University of Maryland, University College Adelphi, MD June 5-8, 2006…

    • 4565 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Security Concerns

    • 9355 Words
    • 31 Pages

    According to Walter Lippman,” A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able, if challenged to maintain them by war”. Security as a concept is a subject of interpretations. The term security is always relative, contextual and situational. Interestingly enough, the security of one nation tends to generate the feeling of insecurity among others. Pakistan’s…

    • 9355 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    Ada tiga macam firewall yang dapat dimodifikasi: input (menyatakan paket yang memasuki sistem Linux anda), output (menyatakan paket yang keluar dari Linux anda), dan forward (menyatakan paket yang melalui Linux anda).…

    • 2062 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Linux:introduction

    • 904 Words
    • 4 Pages

    Linux and its Application1 Sunil Bhooshan Introductory Importance of Linux ... The File System Basic File Utilities Linux and its Application-1 Sunil Bhooshan Department of ECE JUIT Linux and its Application1 Outline Sunil Bhooshan Introductory Importance of Linux ... 1 Introductory 2 Importance of Linux ... 3…

    • 904 Words
    • 4 Pages
    Powerful Essays