Preview

Linux Security

Satisfactory Essays
Open Document
Open Document
449 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Linux Security
IS3440 Final Exam Review
IS3440 Final Exam Review

skong@itt tech.edu skong@itt‐tech.edu CIA triad
CIA triad

Remote Access
Remote Access

Virtualization

OSSTMM

WINE

Access control
Access control

Authentication Databases
Authentication Databases

Firewall support
Firewall support

/etc/sudoers

/etc/passwd

/etc/login.defs

PAM

Edit /etc/sudoers
Edit /etc/sudoers file

FHS

FHS recommended to locate configuration files in the /etc/ path

FHS

/etc/fstab

Samba

Encrypted Partitions and Volumes
Encrypted Partitions and Volumes

filesystem quota

chroot Jail
Use chroot jail:
• To enable an application access its own set of
To enable an application access its own set of libraries and directory structure
• T
To restrict access to users on a system ti t t t
• To run software such as Berkeley Internet
Name Domain (BIND)

Bastion Hosts
Only has access to the one server and service

H
Black‐hat hacker exploits a bug in the
Simple Mail Transfer
Protocol (SMTP)
Protocol (SMTP)
Server
Now has access
Now has access to all the server services Web Server

Database Server

Bastion Hosts
Bastion Hosts

SMTP Server

Multipurpose Server li S

Common Network Services Software
File Sharing g Samba
Has built‐in interoperability with
Windows clients

Network File System (NFS)
Generally faster than Samba when transferring large files

Can be set up as a member server Easy to set up in Windows environment in Windows environment
Has username/password authentication Authentication is Internet Protocol
(IP)‐based; however, it can support
Kerberos
Can configure to squash root
Can configure to squash root

ssh

Security Considerations for the Linux
Desktop
p
• Turn off the X Display Manager Control p y g Protocol (XDMCP).
• Keep only those productivity tools that are
Keep only those productivity tools that are

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 9

    • 474 Words
    • 2 Pages

    C) FTP (File transfer protocol) - is a standard way of gathering files between computers on the Internet over IP/TCP…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks,…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Linux Hw

    • 287 Words
    • 2 Pages

    What kind of server repond to recursive queries ? how does this server work ?…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Better Essays

    CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Perform a risk assessment. Perform a risk assessment. Fill out the control table for Classic Catalog Company…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. There is a proper management of files because they are stored at the same place; files are easier to find.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    How to reduce the attack surface with what hardening steps and network security management best practices, (100) 2) ensure secure authentication, authorization, and accounting, (100) and 3) prevent or respond to intrusions. (100)…

    • 310 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    infromation security

    • 541 Words
    • 3 Pages

    The fact that the company's position of VOIP2.biz is a very difficult and very spiky to the lack of support or facilities or external funders to ensure the functioning of the company in the right direction, pace and confident. With the Executive Director to develop two plans and the division of each plan in two phases, but the regulations of the state and the policy of monopoly and the large size of the expenditure and income of vulnerable and interest, as described in the economic feasibility of the project has failed, unfortunately, must be in place a contingency plan to save the company. As is well known the field of finance and business , it does not have the only solution , but there are the best solution which is the situation in which the best so get out the least possible losses and costs in innovative ways and smart through the Executive Director, a seasoned expert in risk management and the company VOIP2.biz considered a good model for many companies entering the market and is located in a critical position and a person must have sufficient expertise to save the critical situation.…

    • 541 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Security System

    • 22767 Words
    • 92 Pages

    Wouldn’t it be nice to have your home take care of your thing for you, automatically, without you having to lift a finger? You bet it would. This is the promise of Home Automation.…

    • 22767 Words
    • 92 Pages
    Powerful Essays