Thursday, May 7, 2020

Linux Security - 985 Words

Robert Hoffman Linux Research 2.1 Security for computers is one of the most important aspects of a system that has to be in place. For this paper I will be writing about four security features that Linux systems use; these are SELinux, chroot jail, openSSH, and iptables. I will briefly describe what they do to provide security. SELinux (security enhanced Linux) was developed by the NSA, who chose Linux as its operating system to create a more secure operating system. Since the development of SELinux by the NSA most Linux distributions now implement SELinux as a standard. Traditional Linux systems use a security called (DAC) discretionary access control. With this approach users and their objects, i.e., files†¦show more content†¦Setting iptables is highly beneficial to your system, along with a main firewall iptables allows for a more secure system based on parameters you set in the iptables. OpenSSH is a set of programs that provide encrypted communication between networks. Created by the openBSD team as an alternative to the original SSH software. When it starts there are two tasks that it performs right away, first it establishes an encrypted connection, second it authenticates the user. When these two tasks are complete two systems can securely send information back and forth. When the session is started openSSH encrypts anything sent out on the network, this prevents many security risks from being exploited. Two key pairs are used to enable an encrypted connection; a host key pair and a session key pair. The host key pair is established when the system forst boots and consists of public and private keys. The session key pair also consists of a public and private key and these change hourly. When a client first connects with a server you are asked to verify that the server you are wanting to connect to is the right one. Once verification is complete the client make a copy of the servers public host key so the next time the client wants to connect to that server it will have a copy of the key to verify the server with. Computer security is crucial inShow MoreRelatedLinux Security1588 Words   |  7 Pagessingle sub-tree of the file system.† â€Å"In order for it to work properly, some common programs and libraries need to be copied or linked to the appropriate locations in the new directory tree.† (Haas) The term sandbox is a metaphor for the type of security that chroot jail uses. Once you put a program or utility into the jail, it only knows of what is contained in the cell, the rest of your system becomes invisible to it. It does this by changing the apparent root directory for the current runningRead MoreLinux Securities1119 Words   |  5 PagesSecurity of a system when you are open to the internet is paramount in the world of servers. Linux has many layers of ever evolving security in order to keep up with the would be attackers in cyberspace. This is one of the reasons that Linux is one of the most used servers for internet sites and has few viruses engineered towards it. IP Tables Developed by the Netfilter organization the IP tables package for Linux is an evolution of the IP chains which came from the IPv4 Linux firewall packageRead MoreLinux Security Technology1868 Words   |  8 Pages|Linux Security Technology | | 1. SELinux SELinux, an implementation of  Mandatory Access Control  (MAC) in the Linux kernel, adds the ability to administratively define policies on all subjects (processes) and objects (devices, files, and signaled processes). This mechanism is in the Linux kernel, checking for allowed operations after standard Linux Discretionary Access Controls DAC are checkedRead More4-20-2014 Protection and Security mechanisms in Linux and Windows Intro to Operating2800 Words   |  12 Pages4-20-2014 Protection and Security mechanisms in Linux and Windows Intro to Operating Systems Stuart Gourlay (12382696) Rory O’Reilly (12370056) â€Æ' Table of Contents Windows 2 Overview of Windows 8 2 New Features 2 System Requirements 2 Security Mechanisms in Windows 8 3 Address Space Layout Randomization 3 Heap Randomization 3 Kernel Mode Security 3 UEFI Secure Boot 4 Windows Defender 4 Linux 5 How Linux is Broken Down 5 OverviewRead MoreEssay about Security Enhanced Linux (Selinux), Chroot Jail, and Iptables682 Words   |  3 PagesSecurity Enhanced Linux (Selinux), Chroot Jail, and Iptables Security Enhanced Linux (Selinux), Chroot Jail, and Iptables Three of the most important types of Linux security technologies are Security Enhanced Linux (SELinux), chroot jail, and iptables. This security measures aide in the subversion of theft and malicious activity. We will discuss these items in depth to address who created them and for what reason. Along with how these technologies changed the operating system to enforce securityRead MoreLinux Security3394 Words   |  14 PagesSecuring Linux Platforms and Applications Project Project Part 1 Task 1: Outline Security Policy This security policy is essential to the First World Bank Savings and Loan. It is used to break up the security plan not measurable, specific, and testable goals and objectives. This security policy would be used to provide all current and prospective customers online banking services while keeping the First World Saing bank competitive in the financial marketplace. This solution is also an imperativeRead MoreRed Hat Enterprise Linux 6 Security Guide50668 Words   |  203 PagesRed Hat Enterprise Linux 6 Security Guide 1 Red Hat Enterprise Linux 6 Security Guide A Guide to Securing Red Hat Enterprise Linux Edition 3 Red Hat Engineering Content Services 2 Legal Notice Legal Notice Copyright  © 2011 Red Hat, Inc. Based on the Fedora Security Guide (current version at http://docs.fedoraproject.org/enUS/Fedora/16/html/Security_Guide/index.html), written by Johnray Fuller, Eric Christensen, Adam Ligas, and other Fedora Project contributors. T he textRead MoreThe Linux Security Checklist From Sans2024 Words   |  9 Pagesinto the system. The Linux Security Checklist from SANS has basic step by step guidance one can follow in securing an OS (Homsher Evans, n.d.). 5.1. Never run Jenkins with root/administrator privileges One should never run with administrator or root privileges regardless of the operating system platform. If a hacker manages to get in, he or she will still need to find ways to perform privilege escalation to cause more harm. Hopefully, this buys enough time for security professionals within theRead MoreFirst World Bank Savings And Loan1149 Words   |  5 PagesFirst World Bank Savings and Loan Mission: First World Bank Savings and Loan strives to become the leader in the competitive financial institution market by applying new and updated security policies to their advanced Linux based server applications. Company Background: First World Bank Savings and Loan is a financial institution in the United States, a leading financial service firm that estimates over $100,000,000 a year in online credit card transactions for loan applications and other bankingRead MoreMajor Elements Of Memory Management1648 Words   |  7 PagesD. Major elements of memory management Linux operating system is using virtual memory to support programs running in the system. The virtual memory provides lots of optimal ways to maximize the memory mapping and utilization. The virtual memory can allocate much more memory to processes than its actual physical memory size. Linux provides virtual memory great support to allow the processes running in the system, such as mapping the process’s memory to physical memory (Arora, 2012). There are two

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.