J-202. IT 4823 Information Security Administration. Linux Security Model. Linux Security. In Room. Linux Security April 23
|
|
|
- Lesley Logan
- 9 years ago
- Views:
Transcription
1 Final Exam Final exam date: May 5, 4:00 5:50 PM. IT 4823 Information Security Administration Linux Security April 23 In Room J-202 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles and Practice, 1/e, by William Stallings and Lawrie Brown, Chapter 6 Intrusion Detection. Linux Security Linux has evolved into one of the most popular and versatile operating systems Many features mean broad attack surface You can create highly secure Linux systems We will review: Discretionary Access Controls typical vulnerabilities and exploits in Linux best practices for mitigating those threats new improvements to Linux security model Linux Security Model Linux s traditional security model is: people or proceses with root privileges can do anything other accounts can do much less Hence, attackers want to get root privileges One can run robust, secure Linux systems The crux of the problem is use of Discretionary Access Controls (DAC) Linux Security Transactions File System Security In Linux everything is treated as a file e.g. memory, device-drivers, named pipes, and other system resources hence why filesystem security is so important I/O to devices is via a special file e.g. /dev/cdrom There are other special files like named pipes a conduit between processes / programs 1
2 Users and Groups A user-account (user) represents someone capable of using files associated both with humans and processes A group-account (group) is a list of user-accounts users have a main group may also belong to other groups Users and groups are not files Users and Groups user s details are kept in /etc/password maestro:x:200:100:maestro Edward Hizzersands:/home/maestro:/bin/bash additional group details in /etc/group conductors:x:100: pianists:x:102:maestro,volodya use useradd, usermod, userdel to alter File Permissions files have two owners: a user and a group each with its own set of permissions with a third set of permissions for other permissions are to read/write/execute in order user/group/other, cf. -rw-rw-r-- 1 maestro user Mar 25 01:38 baton.txt set using chmod command Directory Permissions read = list contents write = create or delete files in directory execute = use anything in or change working directory to this directory e.g. $ chmod g+rx extreme_casseroles $ ls -l extreme_casseroles drwxr-x--- 8 biff drummers 288 Mar 25 01:38 extreme_casseroles Sticky Bit originally used to lock file in memory now used on directories to limit delete (and other things) if set must own file or dir to delete other users cannot delete even if they have write permission set using chmod command with +t flag, e.g. chmod +t extreme_casseroles directory listing includes t or T flag drwxrwx--t 8 biff drummers 288 Mar 25 01:38 extreme_casseroles only apply to specific directory not child dirs SetUID and SetGID setuid bit means program runs as owner no matter who executes it setgid bit means run as a member of the group which owns it again regardless of who executes it run as = run with same privileges as are very dangerous if set on file owned by root or other privileged account or group 2
3 SetGID and Directories setuid has no effect on directories setgid does and causes any file created in a directory to inherit the directory s group This is useful if users belong to other groups and routinely create files to be shared with other members of those groups, instead of manually changing its group Numeric File Permissions Each digit represents a bit in a mask: 1 = execute, 2 = write, 4 = read For specials: 1=sticky bit, 2=setgid, 4=setuid Kernel vs User Space Kernel space refers to memory used by the Linux kernel and its loadable modules (e.g., device drivers) User space refers to memory used by all other processes Since the kernel enforces Linux DAC and security, it is critical to isolate kernel from user so kernel space is never swapped to disk only root may load and unload kernel modules setuid root Vulnerabilities A setuid root program runs as root no matter who executes it Used to provide unprivileged users with access to privileged resources Must be very carefully programmed because they could be exploited if there are errors Distributions now minimize setuid-root programs System attackers still scan for them! Web Vulnerabilities A very broad category of vulnerabilities with big and visible attack surfaces When written in scripting languages not as prone to classic buffer overflows can suffer from poor input-handling Few enabled-by-default web applications But users install vulnerable web applications Or write custom web applications having easily-identified and easily-exploited flaws Rootkits Allow attackers to cover their tracks If successfully installed before detection, all is very nearly lost Originally, collections of hacked commands hiding attacker s files, directories, processes Now rootkits use loadable kernel modules intercepting system calls in kernel-space hiding attacker from standard commands May be detectable with chkrootkit Generally have to wipe and rebuild system 3
4 Linux System Hardening We consider how to mitigate Linux security risks at system and application levels First, look at OS-level security tools and techniques that protect the entire system OS Installation Security begins with OS installation Especially what software is run since unused applications liable to be left in default, unhardened and un-patched state Generally should not run: X Window system, RPC services, R-services, inetd, SMTP daemons, telnet etc Initial system software configuration: setting root password creating a non-root user account setting an overall system security level (initial file permissions) enabling a simple host-based firewall policy enabling SELinux Patch Management Installed server applications must be: configured securely kept up to date with security patches Patching can never win patch rat-race There are tools to automatically download and install security updates e.g. up2date, YaST, apt-get Note: one should not run automatic updates on change-controlled systems without testing Network Access Controls The network is a key attack vector to secure TCP wrapper is a key tool to check access originally tcpd inetd wrapper daemon before allowing connection to service checks if requesting host explicitly in hosts.allow is ok if requesting host explicitly in hosts.deny is blocked if not in either is ok Checks on service, source IP, username Now often part of application using libwrappers Network Access Controls Linux has a very powerful netfilter kernel-based native firewall mechanism and iptables user-space front end Useful on firewalls, servers, desktops Direct configuration is tricky, steep learning curve There are automated rule generators Typically, personal firewall use will: allow incoming requests to specified services block all other inbound service requests allow all outbound (locally-originating) requests Can be configured manually for greater security Antivirus Software Historically, Linux has not been as vulnerable to viruses ad MS systems This is more due to lesser popularity than security Prompt patching was effective for worms Viruses abuse users privileges, so non-root users have less scope to exploit Growing Linux popularity means growing exploits Hence, antivirus software will be more important There are various commercial and free Linux A/V 4
5 User Management Guiding principles in user-account security: need care setting file / directory permissions use groups to differentiate between roles use extreme care in granting / using root privs Commands: chmod, useradd/mod/del, groupadd/mod/del, passwd, chage Critical information in files /etc/passwd and /etc/group Manage user s group memberships Set appropriate password ages Root Delegation Linux has root can to anything, users do little issue su command allows users to run as root either root shell or single command must supply root password means likely too many people know this SELinux RBAC can limit root authority, complex to configure sudo allows users to run as root but only need their password, not root password /etc/sudoers file specifies what commands allowed Or configure user/group perms to allow, tricky Logging Effective logging is a key resource Linux logs using syslogd or Syslog-NG receive log data from a variety of sources sorts by facility (category) and severity writes log messages to local/remote log files Syslog-NG preferable because it has: variety of log-data sources / destinations much more flexible rules engine to configure can log via TCP which can be encrypted One should check and customized defaults Log Management Balance number of log files used size of few to finding info in many Manage size of log files must rotate log files and delete old copies typically, use logrotate utility run by cron to manage both system and application logs Configure application logging Application Security Many security features are implemented in similar ways across different applications Approaches: running as unprivileged user/group running in chroot jail modularity encryption logging Running As Unprivileged User/Group Every process runs as some user Extremely important that this user is not root since any bug can compromise entire system May need root privileges, e.g. bind port have root parent perform privileged function but main service from unprivileged child User/group used should be dedicated, making it easier to identify source of log messages 5
6 Running in chroot Jail chroot confines a process to a subdirectory maps a virtual / to some other directory useful if have a daemon that should only access a portion of the file system, e.g. FTP directories outside the chroot jail aren t visible or reachable at all Contains effects of compromised daemon Complex to configure and troubleshoot; must mirror portions of system in chroot jail Modularity Applications running as a single, large, multipurpose process can be: more difficult to run as an unprivileged user harder to locate / fix security bugs in source harder to disable unnecessary functionality Hence, modularity is a highly prized feature providing a much smaller attack surface cf. postfix vs sendmail, Apache modules Encryption Sending logins and passwords or application data over networks in clear text exposes them to network eavesdropping attacks Many network applications now support encryption to protect such data, often using OpenSSL library OpenSSL may need X.509 certificates can generate/sign using openssl command may use commercial/own/free CA Logging Applications can usually be configured to log to any level of detail (debug to none) Must decide whether to use dedicated file or system logging facility (e.g. syslog) central facility useful for consistent use Must ensure any log files are rotated Mandatory Access Controls Linux uses a DAC security model Mut Mandatory Access Controls (MAC) impose a global security policy on all users users may not set controls weaker than policy normal admin done with accounts without authority to change the global security policy but MAC systems have been hard to manage Novell s SuSE Linux has AppArmor RedHat Enterprise Linux has SELinux Use pure SELinux for high-sensitivity, high-security SELinux NSA s powerful implementation of mandatory access controls for Linux Linux DACs still applies, but if it allows the action SELinux then evaluates it against its own security policies Subjects are processes (run user cmds) Actions are permissions Objects are not just files and directories To manage complexity SELinux has: that which is not expressly permitted, is denied (default deny) groups of subjects, permissions, and objects 6
7 Security Contexts Each individual subject and object in SELinux is governed by a security context being a: user - individual user (human or daemon) SELinux maintains its own list of users user labels on subjects specify account's privileges user labels on objects specify its owner role - like a group, assumed by users a user may only assume one role at a time, may only switch roles if and when authorized to do so domain (type) - a sandbox being a combination of subjects and objects that may interact with each other This model is called Type Enforcement (TE) Decision Making in SELinux Two types of decisions: access decisions when subjects do things to objects that already exist, or create new things in expected domain transition decisions invocation of processes in different domains than the one in which the subject-process is running creation of objects in different types (domains) than their parent directories transitions must be authorized by SELinux policy RBAC and MLS Controls SELinux has Role Based Access Control (RBAC) rules specify roles a user may assume other rules specify circumstances when a user may transition from one role to another and Multi Level Security (MLS) concerns handling of classified data no read up, no write down MLS is enforced via file system labeling SELinux Policy Management Creating and maintaining SELinux policies is complicated and time-consuming A single SELinux policy may consist of hundreds of lines of text RHEL has a default targeted policy defines types for selected network apps allows everything else to use DAC controls There is a (large) set of SELinux commands Novell AppArmor Novell s MAC for SuSE Linux enforced at kernel level using Linux Security Modules Restricts behavior of selected applications in a very granular but targeted way hence a compromised root application s access will be contained has no controls addressing data classification hence only a partial MAC implementation Non-protected applications just use Linux DAC Questions 7
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 23 Linux Security EECS 710 Professor: Dr. Hossein Saiedian Presented by Ankit Agarwal 1 Outline Introduction Linux Security Model Linux File-System Security
How To Protect Your Computer From Attack In Linux (Windows) From A Hacker (Windows 2) And A Hacker From A Remote Control (Windows 3) (Windows 4) (For Windows) (Amd64) (Powerpoint) (Evil)
IT 4823 Information Security Administration Internet Authentication Protocols Linux and Windows Security July 9 Identification and Authentication Identification? Authentication? Authorization Notice: This
CHAPTER 25 LINUX SECURITY
CHAPTER 25 LINUX SECURITY 25.1 INTRODUCTION... 2 25.2 LINUX S SECURITY MODEL... 3 25.3 THE LINUX DAC IN DEPTH: FILE-SYSTEM SECURITY... 5 25.4 LINUX VULNERABILITIES... 17 25.5 LINUX SYSTEM HARDENING...
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!
Safety measures in Linux
S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Thanks for choosing sentora-paranoid for your sentora hosting environment security solution
Sentora-paranoid version 1.0.1 by: Mario Rodríguez Somohano [email protected] Official web site: http://sentora-paranoid.open-source.tk Forum: http://forum.sentora-paranoid.open-source.tk
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science [email protected] 1 Reminders After
Secure computing: SELinux
Secure computing: SELinux Michael Wikberg Helsinki University of Technology [email protected] Abstract Using mandatory access control greatly increases the security of an operating system. SELinux,
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet
Confining the Apache Web Server with Security-Enhanced Linux
Confining the Apache Web Server with Security-Enhanced Linux Michelle J. Gosselin, Jennifer Schommer [email protected], [email protected] Keywords: Operating System Security, Web Server Security, Access
GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days
GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
Securing Linux Servers Best Practice Document
Securing Linux Servers Best Practice Document Miloš Kukoleča Network Security Engineer CNMS Workshop, Prague 25-26 April 2016 Motivation Majority of production servers in academic environment are run by
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Linux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
Access Control Lists in Linux & Windows
Access Control Lists in Linux & Windows Vasudevan Nagendra & Yaohui Chen Categorization: Access Control Mechanisms Discretionary Access Control (DAC): Owner of object specifies who can access object (files/directories)
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion
LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes
LINUX SECURITY COOKBOOK DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes ORELLY Beijing " Cambridge " Farnham " Koln " Paris " Sebastopol " Taipei - Tokyo Table of Contents Preface............,....................................................A
Parallels Plesk Automation
Parallels Plesk Automation Contents Get Started 3 Infrastructure Configuration... 4 Network Configuration... 6 Installing Parallels Plesk Automation 7 Deploying Infrastructure 9 Installing License Keys
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac
Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist Intentions
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall 2014. Lake
Objectives Windows 7 Security By Al Fall 2014 CS 140M LBCC Background Windows Security Architecture Windows Vulnerabilities Means of Evaluating Metrics System Hardening Windows Defenses OS Security Capabilities
Likewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques
Syslog & xinetd. Stephen Pilon
Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide
QuickBooks Enterprise Solutions Linux Database Server Manager Installation and Configuration Guide Copyright Copyright 2007 Intuit Inc. All rights reserved. STATEMENTS IN THIS DOCUMENT REGARDING THIRD-PARTY
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency
The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical
Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett
Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Securing the Apache Web Server
Securing the Apache Web Server Jaqui Lynch Mainline Information Systems Email [email protected] Session I12 Agenda Anatomy of a Web Transaction General Firewall and Network Web Server Parameters
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Desktop : Ubuntu 10.04 Desktop, Ubuntu 12.04 Desktop Server : RedHat EL 5, RedHat EL 6, Ubuntu 10.04 Server, Ubuntu 12.04 Server, CentOS 5, CentOS 6
201 Datavoice House, PO Box 267, Stellenbosch, 7599 16 Elektron Avenue, Technopark, Tel: +27 218886500 Stellenbosch, 7600 Fax: +27 218886502 Adept Internet (Pty) Ltd. Reg. no: 1984/01310/07 VAT No: 4620143786
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Presented by Henry Ng
Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS [email protected]
CEN 559 Selected Topics in Computer Engineering Dr. Mostafa H. Dahshan KSU CCIS [email protected] Access Control Access Control Which principals have access to which resources files they can read
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.
Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2
JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85
Information Security Measures and Monitoring System at BARC - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Approach Secure Network Design, Layered approach, with SPF and Application
Security Best Practice
Security Best Practice Presented by Muhibbul Muktadir Tanim [email protected] 1 Hardening Practice for Server Unix / Linux Windows Storage Cyber Awareness & take away Management Checklist 2 Hardening Server
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
Analysis of the Linux Audit System 1
Analysis of the Linux Audit System 1 Authors Bruno Morisson, MSc (Royal Holloway, 2014) Stephen Wolthusen, ISG, Royal Holloway Overview Audit mechanisms on an operating system (OS) record relevant system
CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004
CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider
Cisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Railo Installation on CentOS Linux 6 Best Practices
Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to
