Preview

Linux admin research 2

Satisfactory Essays
Open Document
Open Document
430 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Linux admin research 2
Vincent Centeio
Linux Adminstration
Research Assignment 2.1

Security Enhanced Linux is an extension that is designed to enforce strict access controls that confine processes to the minimum amount of privilege that they require. It was release late in 2000 by the US National Security Agency (NSA), SELinux was created to help such organizations that need heavy security like NAI labs, Secure computing Corporation, and MITRE Corporation. Security experts use a number of models to describe security access control systems. The most common is the Discretionary Access Control (DAC).
It is how each user has complete control over the files that they own and the programs that they use, and programs run by a user will have all of the rights that the user has. A user can allow others access to her objects at her discretion, and under such a model the level of security of a system is left to the discretion of the applications running on it. Under MAC, administrators control every interaction on the software of the system. Standard UNIX permissions are still present, and are consulted before the SELinux policy during access attempts. When the standard file permissions allow access, the SELinux policy will be consulted and access is either gained or denied based on security of the source process and the targeted object.

The chroot system call was introduced during development of Version 7 Unix in 1979, and added to BSD by Bill Joy on 18 March 1982 – 17 months before 4.2BSD was released – in order to test its installation and build system. It was used for testing and development, dependency control, compatibility, recovery and, privilege separation. A chroot jail is created to limit the potential chance of an attacker. It is a security method that locks out any process and any user id link to that single directory. Iptables is a firewall made by the official Ubuntu distributions. Iptables requires elevated privileges to operate and must be executed by user

You May Also Find These Documents Helpful

  • Powerful Essays

    g. Security software limits access to programs and data files, and keeps a log of programs and files that have been accessed, which is then reviewed by the security manager daily. Category: 4.3.1, Assertion: Any Assertion…

    • 757 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    In this lab, you practiced properly securing a Linux server system. You performed the steps to secure the bootloader, enable iptables, and run SELinux to help lock down the Linux OS. You also applied ACLs to directories and files to secure file and data access and then checked those ACLs and permissions on the system.…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    Unix security systems were designed into the architecture. Raw hardware devices are protected from direct access, and the file system has an inbuilt security system giving individual access to files on three levels, user only, group membership, and world access. Each category has read, executable and write flags that may be set in any combination. Kernel -or- System…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Programmers originally built the Unix operating system for other programmers to use. It is an extensible operating system, meaning it allows programmers to extend and change it to do anything they need it to. Essentially, it is built to multitask. It allows multiple users to use the same app or multiple users access to the same file. Although the computer cannot process all the requests at once, it does prioritize the requests to keep things orderly.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions and/or assign security attributes. (The traditional UNIX system of users, groups, and read-write-execute permissions is an example of DAC.) MAC-enabled systems allow policy administrators to implement organization-wide security policies. Unlike with DAC, users cannot override or modify this policy, either accidentally or intentionally. This allows security administrators to define a central policy that is guaranteed (in principle) to be enforced for all users.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Intro to Unix Project 2

    • 636 Words
    • 3 Pages

    2- Description of pipes: The symbol | is the Unix pipe symbol that is used on the command line. What it means is that the standard output of the command to the left of the pipe gets sent as standard input of the command to the right of the pipe. Note that this functions a lot like the > symbol used to redirect the standard output of a command to a file. However, the pipe is different because it is used to pass the output of a command to another command, not a file.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    GRUB is a boot processor that allows a person to boot into other operating systems. It is…

    • 521 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Explore and Discuss

    • 1383 Words
    • 6 Pages

    C.1.a) POSIX - a family of standards specified by the IEEE for maintaining compatibility between operating systems.…

    • 1383 Words
    • 6 Pages
    Satisfactory Essays
  • Best Essays

    Linux Course Project

    • 2602 Words
    • 11 Pages

    References: Bodnar, L. (2005, October 5). A Look at EnGarde Secure Linux 3.0. Retrieved from http://lwn.net/Articles/154522…

    • 2602 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    USASOC Pam 25-3, DCSIM User’s Reference Guide. d. USASOC Pam 25-4, Hardware and Software Standards for Desktop and Portable computers. e. USASOC Reg 25-70, ASOCNet Security. f. USASOC Reg 25-71, Redistribution and Reporting Excess Information Mission Area Equipment. g. USASOC Reg 380-3, Malicious Software.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    With UNIX systems, including the older ones, at least one user would have access to all areas of the system, the idea of this being so that they control the systems for other users and grant or deny them access to various objects. By doing this, UNIX implies that the administrator should have the most control and other users have fewer privileges to reduce security breaches or damage. UNIX’s method of an ACL is the domain; this consists of pairs of objects and rights. The pair, called a tuple, names the object and what operations can be carried out on it. An object in a domain has up to three rights of access; read, write and execute. An object can be part of a number of domains, if it is, then it can have different rights in each domain that it is a part of. In UNIX, the domain has User and Group ID’s (UID, GID) that defines the protection of that domain. Different combinations of UID and GID’s on different objects allow it to be…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    For eg. if /dir1/dir2/chroot-dir is the JAILROOT directory in our configuration then the process run from login within this directory shall have no knowledge of anything above "/dir1/dir2/chroot-dir/". For this process /dir1/dir2/chroot-dir/ is their "/" in the process context.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays