Linux Security Essay

686 words - 3 pages

Install a Fedora Linux Operating System on a Server

1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time?
So that all events have a proper timestamp for documentation.
2. During the install, a password has been set for the “root” user. What is the “root” user, and when is it appropriate to use this account?
The root user or super user has access to all commands and files on a Linux operating system. It is used when making changes to the system and installing software in RPM (Redhat Package Manager).
3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Window environment. Explain the purpose of this recommendation.
It is recommended to not run this because of the vulnerabilities it poses.
4. During the installation process it asks what the options ...view middle of the document...

The swap file is a special file in the filesystem that resides amongst your system and data files.
7. What are some of the benefits and features that are available to Linux users by selecting the ext4 file system for the partitioning of a Linux system?
Large file system, backwards compatibility with ext3 and ext2, extents, and delayed allocation.
8. How is the passwd file used, and what fields make up its content? Explain.
The /etc/passwd is a text file that contains a list of the system's accounts, giving for each account some useful information. There are 7 fields: Username, password, User ID, Group ID, user id info, home directory, and command/shell
9. What is the fstab file used for and what fields make up its content? Explain.
Fstab is a system configuration file on Linux that contains information about major filesystems on the system. There are 6 fields: physical location of each filesystem, the mount point, the filesystem type, designation of who and how the filesystem can be used, determines use of dump command for backup, order in which the computer checks the filesystems.
10. Explain the significance of creating separate partitions of the /var and /boot directories? What is contained within these directories?
/var is where spool directories such as those for mail and printing go. In addition, it contains the error log directory and /boot is where your kernel images and boot loader configuration go. Having these in their own partition holds a better hierarchy for the system. It adds to security and it’s easier for backup and recovery.
11. How would selecting the option “encrypt filesystem” be useful?
You can encrypt your filesystems this way.
12. How can partitioning with Logical Volume Manager (LVM) help as it relates to the CIA Triad of security?
It allows you to encrypt your data during install and partitioning helps make a more secure system.
13. What security advantages can be realized when selecting the “minimal” software install option?
Fewer software packages, fewer potential errors and/or security issues
14. How could you automate a Fedora install geared for security?
Redhat satellite service
15. What is the purpose of “firstboot”?
It allows you to configure more things than the installer.

Other Papers Like Linux Security

Linux Security Technology Essay

1875 words - 8 pages |Linux Security Technology | | 1. SELinux SELinux, an implementation of Mandatory Access Control (MAC) in the Linux kernel, adds the ability to administratively define policies on all subjects (processes) and objects (devices, files, and signaled processes). This mechanism is in the Linux kernel, checking for allowed operations after

Is3440 Linux Security Lab 1 Essay

1514 words - 7 pages this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname

Operating System

1125 words - 5 pages socket buffer (skbuff) structures. The socket buffer architecture allowed the flexibility in manipulating packet headers and checksums while avoiding unnecessary data copying. Linux extensively supports TCP/IP protocol suite, UDP, TCP, IMAP protocols implemented on top of it. Firewall management is done with selective filtering of packets according to arbitrary criteria, usually for security purposes. The firewall manager maintains a number of

Linux Server Apps in Corporate Business Ops

729 words - 3 pages server, it can be run without the video requirements that are needed with GUI interfaces. In this aspect, energy can be saved due to the processor not having to work overtime to refresh the pages for every GUI change. Also with Linux, you are not restricted to wait on Microsoft for bug fixes or patches for vulnerabilities. A corporate business can hire in-house Linux programmers, code writers, security personnel and administrators to handle the


1010 words - 5 pages bnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm Research Assignment 2.1 4/9/2012 Kathleen Cline | Research Assignment 2.1 Linux security technologies SELinux, chroot jail, and iptables For each security technology, explain what organization (if any) is behind it

Linux Introduction an Basics

1506 words - 7 pages Server Security Source-based Specialist Telephony Thin Client UNIX there are: ► 325 Linux maintained distribtions (677 total) Beginners BSD Clusters Desktop Education Firewall Forensics Free Software Gaming High Performance Computing Live Medium ♦ Distributions are categorized in: ► ► ► ► ► ► ► ► ► ► ► Supported Hardware ♦ You can find the supported ► ► ► ► ► ► ► ► ► ► ► ► ► ► ► hardware platforms on each


276 words - 2 pages only one computer installation. Another advantage you gain from installing Linux onto your computer is the fact that this software has stronger security than other OS. There is your choice is another great advantage of using Linux over other operating systems. This is because the user is allowed to control almost all aspects of the system. Majorly, you will be allowed to change how your desktop looks and feels. Fourthly Linux software is packed

Computer Oss Comparison Essay

1900 words - 8 pages for SMP machines” (Santhanam, 2003). These changes are what moved Linux from being just a UNIX OS for PC to a viable business operating system. Linux kernel version 2.6, which was released in December 2003, introduced the SELinux security extension, which improved the performance of this OS on the higher end machines by cleaning up the kernel codebase to allow newer feature to be integrated into the kernel such as virtualization and

Nt1110 Module 1 Lab

1269 words - 6 pages frequently compared to other operating systems – further enhancing their stability and security. Linux operating systems are perhaps the most widely ported – there are distributions used in a wide range of devices from smartphones to TiVo. Differences 1. Windows - Pros - Compatibility: Almost every application, driver or game will work on Windows. Technical support: Having so many users, you can always find someone (either online or offline

The House

1271 words - 6 pages • When you are done, log out for security – Ends your current process – Indicates to OS you are finished – For the Bourne, Korn, or Bash shells: • Enter exit on command line • Or, press Ctrl+d – In C shell, enter logout on the command line • However, if you are using a GUI, these commands will only close terminal window – Use the Log Out option for the desktop instead 36 12 Understanding the Role of the UNIX/Linux System

Case Project

1350 words - 6 pages secure enough to ensure that the information can only be seen by the right people. To help keep things organized, a file structure will also be required to keep all the files with special permissions together for easy access. To better illustrate the security capabilities of Linux Ed Sawicki of said, “The Linux firewall has functionality that rivals expensive commercial firewalls. Its rules allow fine grained control over stateless and

Related Essays

Linux Security Essay

448 words - 2 pages Linux Security Project Part 1 Instructor Sandro Tuccinardi Student Brian Dupee Security Policy Outline First World bank wants to provide banking services online to its customers. The institution estimates over $100,000,000 a year in online credit card transactions for loan applications and other banking services. According to a team that was formed using a Linux an open source infrastructure would roughly as

Linux Security Essay

1599 words - 7 pages . National Security Agency(NSA). “SELinux was released under the NSA under the GNU GPL open source license. SELinux is essentially a Linux kernel with a number of utilities that provide enhanced security functionality. But the critical component of SELinux is how it implements and handles mandatory access controls. SELinux is important because mandatory access controls are essential to limiting access to daemons and users to only what they need. It

Linux Security Technologies Essay

1229 words - 5 pages George McShane Research Paper 07/13/2012 Linux Security Technologies In today’s world there are many ways to gain access to the internet. You can go to your local library, a Starbucks, any airport, or even a McDonald’s. With all of these ways to have free access to the Web, the opportunity for hacker’s to get to your personal information is at an all time high. Linux programming has many ways to combat this situation with security

Windows Linux Security Essay

5790 words - 24 pages responds to input from the user), raising the priority of interactive and I/O bounded processes and lowering that of CPU bound processes, to increase the responsiveness of interactive applications.[8] b- Memory Management Disk (Paging) Most hard drive installations of Linux utilize a "swap partition", a partition dedicated exclusively for paging operations. This reduces slowdown due to disk fragmentation 6- Security a- Malware More than 800 pieces