Preview

Project Part 1 Task 1

Good Essays
Open Document
Open Document
295 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Part 1 Task 1
Project Part 1 Task 1

IS3440: Linux Security

4/20/2014

Joshua Holcombe

Task 1
While researching the regulatory requirements needed for First World Bank Savings and Loans I found that a security policy against current server architecture is required to be implemented. The CIA (Confidentiality, Integrity, and Availability) triad is taken into account when analyzing the multiple servers in reference to Linux and Open Source managing security demands.
The "Database Server" requires the administrators go further in terms of technical design through a Linux architecture method. MySQL can be utilized as a backend and comes with script availability to remove test databases, lower systems and data base privileges (Jang, 2011). This method will allow successful requirement of all networking layers.
The Apache Web Server allows the ability to harden the Linux kernel within Apache (Prashant, 2013). The patch available is "grsecurity" and allows protection against zero-day vulnerabilities while utilizing "ksplice" to update the kernal on time (Prashant, 2013).
Samba is used for the file server and has many features to restrict access to what is shared. This includes enforcing password requirements, filtering at the network level, and a check going against group memberships (Jang, 2011).
The SMTP server will be Sendmail. Sendmail comes with the security feature of encrypting the connection (Jang, 2011). We will also need a virus scanning program to ensure mail coming in does not have virus attachments.
The LDAP server will be utilized as the central authentication server so that the involved users have a login that is unified and covers all console logins (LDAP NExt, 2010).

Works Cited
Jang, M. (2011). Security Strategies in Linux Platforms and Applications. Jones & Bartlett Learning.
LDAP NExt. (2010, 06). The official Red Hat Reference Guide. Retrieved from http://www.centos.org/docs/2/rhl-rg-en-7.2/s1-ldap-uses.html
Prashant, P. (2013, 10



Cited: Jang, M. (2011). Security Strategies in Linux Platforms and Applications. Jones & Bartlett Learning. LDAP NExt. (2010, 06). The official Red Hat Reference Guide. Retrieved from http://www.centos.org/docs/2/rhl-rg-en-7.2/s1-ldap-uses.html Prashant, P. (2013, 10 10). Linux for you. Retrieved from http://www.linuxforu.com/2011/05/securing-database-servers/.

You May Also Find These Documents Helpful

  • Better Essays

    After evaluating the business needs of First World Bank Savings and Loan (FWBSL) and the use of secure open source software to enhance security and reduce business costs, I have concluded that the best option would be to introduce Centos to the network. The reason I chose this is because they offer free software and it also mirrors Red Hat Enterprise Linux (RHEL). Centos offer many online support options and can be updated regularly. Listed below are the server options that I suggest are the best option for FWBSL:…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Project Part 1 Task 1

    • 1367 Words
    • 6 Pages

    Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations in which standards are given for risk management projects, including: National Institute of Standards and Technology (NIST), Department of Defense (DOD) Information Assurance Certification and Accreditation Process (DAICAP), and Control Objects for Information and related Technology (COBIT).…

    • 1367 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Project Part 1

    • 487 Words
    • 2 Pages

    There are various factors that affect the communication process. Among many of the factors some are very important and play a very important role throughout society, cultural, ethical and individual ways of perspective and communication. Throughout life people have and/or will be faced with the challenge of playing out these roles in society. For example, there are different cultures around the world. In some culture women are to be covered up at all times and are married off to as trade for cattle or money to their father. Where in cultures women are free to dress and marry by there choice. These two women will experience culture shock while communicating with each other. Culture is the values, attitudes and morals, someone is thought that carry over into their social lives. By taken the time to make sure we as people can cultural communication it can keep down most of the confusing in workplace, school and just maybe the world.…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Part I

    • 289 Words
    • 2 Pages

    You are an information technology (IT) Web specialist working for Up-North Fishing Outfitters (UNFO), a…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Part 1

    • 382 Words
    • 2 Pages

    Up-North Fishing Outfitters (UNFO) is the premier source for those fishing in northern Michigan. They provide equipment, watercraft, safety gear, and other products for local and tourist anglers. UNFO wants to pursue an e-business model to realize additional revenue streams, reduce costs, and improve customer service. With the full support of senior management, the IT department has been tasked to identify e-business and e-commerce web applications to support the proposed transformation.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Course Project - Part 1

    • 637 Words
    • 3 Pages

    Now, initial setup for one-pound bags of premium coffee are at equilibrium. As Starbucks introduces the world to premium blends, the demand curve shifts to the right increasing the price of premium blend coffee. One will have to purchase coffee at this new equilibrium price as other coffee vendors enter the market to…

    • 637 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Course Project 1

    • 1403 Words
    • 6 Pages

    You must show all work and calculations by typing out the longhand formula, or post a screen shot of any online calculator used, or attach an excel file showing formulas/calculations in order to earn any credit…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs departmental folders, and data.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Project part 1

    • 1134 Words
    • 3 Pages

    The way we perceive ourselves in relation to the rest of the world plays an important role in our choices, behaviors and beliefs. Conversely, the opinions of others also impact our behavior and the way we view ourselves. Social psychologists investigate how people view themselves and others, how they interact with and influence others, and how people act when part of a group. Given the amount of time spent thinking about and interacting with other people, it follows that much of our lives are spent with the subject matter of social psychology.…

    • 1134 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Course Project Part Iii

    • 767 Words
    • 4 Pages

    References: Independent Auditor’s Report on Financial Statements Issued in Conformity with International Financial Reporting Standards [Fact sheet]. (n.d.). Retrieved March 10, 2013, from AICPA website: http://www.ifrs.com/overview/Accounting_Firms/Reporting_Standards.html…

    • 767 Words
    • 4 Pages
    Good Essays