Linux Security Technologies Essay

1229 words - 5 pages

George McShane
Research Paper
07/13/2012
Linux Security Technologies
In today’s world there are many ways to gain access to the internet. You can go to your local library, a Starbucks, any airport, or even a McDonald’s. With all of these ways to have free access to the Web, the opportunity for hacker’s to get to your personal information is at an all time high. Linux programming has many ways to combat this situation with security technologies such as SELinux, chroot jail, iptables, and virtual private networks (VPN’s) to name a few.
The basics of Linux security start with Discretionary Access Control, which is based by users and groups. The process starts with a user, who has ...view middle of the document...

SELinux is not recommended for any level of implementation other than development and testing. It is not approved for government use. It is a work-in-progress of a new concept for OS design. SELinux does not attempt to address all known security issues, but it does offer a framework for preventing Unix processes from unauthorized behavior such as reading other process data, changing data, bypassing coarse-grained security, or interfering with other processes.
 In the world of information security, you have to assume that hackers will get into your network. Whether using a zero-day exploit, sending malicious emails to your employees or taking advantage of poor coding in use on your webpage, attackers are coming for you. Your job as an administrator is to make it as difficult as possible for an attacker to gain access as well as being able to detect and mitigate an attack after it occurs. This is why practicing "defense in-depth" must be an essential part of your everyday thought process. When deploying new services, devices, or applications, you should think to yourself: "If this were compromised, how could I mitigate the risk of an attacker advancing further into my network?" In come chroot jails.
Chroot jail is the common expression used to describe a section of a filesystem that is sectioned off for a particular user. On a web server, it is particularly useful for the security of shared hosting accounts. Chroot jail changes the operating system by preventing users from navigating to the /home directory to see other users directories or even navigating up all the way up to see directories such as /etc, /usr, /var, /lib, and other system-critical directories. (Garlie, 2011) Even though the user would not have the permissions to edit them, they would be able to see the files and pick and choose which ones they may want to take advantage of. By created the “jail” you would be able to have the comfortability of knowing that your root directory will be secure from threats and that the users who think they are in your root aren’t actually in it, which is kinda cool.
The initial head of and author behind netfilter/iptables is Paul Russell. Later he was joined by other people, who together build the Netfilter core team and maintain the netfilter/iptables project as a joint effort. Harald Welte was the former leader until 2007. The current head of the netfilter core team is Patrick McHardy. (Garlie, 2011)
Iptables is a powerful way to control packet traffic to and from your Linux box. It does this by creating tables made up of chains. ...

Other Papers Like Linux Security Technologies

Operating System Analysis Paper

4124 words - 17 pages 2003, and Linux operating systems are to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Moreover, the best fit operating system can be determined depended on the individual’s or organization’s needs. Operating System Requirements Windows XP The system requirements for Windows XP Home Edition and Professional Edition are the same

It302 Research #1 Essay

1311 words - 6 pages IT302 Linux Administration Research #1 I researched three Linux security technologies which are, SELinux, chroot jail and iptables. As you read into this research you will see that they are split up into their own catagories so that it is easy to read information on whichever topic you would like. SELinux As part of its Information Assurance mission, the National Security Agency has long been involved with the computer security research

RESEARCH PAPER

884 words - 4 pages In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released

Course Descriptions

1202 words - 5 pages setup, configuration, maintenance, security and troubleshooting of Linux servers and related services in a complex network environment. Tools and scripting skills associated with these areas will also be discussed. Prerequisite: IT250 Linux Operating System IT320 WAN Technology and Application | 4 credit hours This course discusses typical Wide Area Network (WAN) technologies along with survey on existing services and applications

Re: Lesson 06 Discussion Question

2837 words - 12 pages • Steps to update the Registry for Windows XP SP2 – Back up the Registry – Modify the Registry with the write-protection feature – Create two desktop icons to automate switching between enabling and disabling writes to USB device Guide to Computer Forensics and Investigations 15 Windows XP Write-Protection with USB Devices (continued) Guide to Computer Forensics and Investigations 16 Acquiring Data with a Linux Boot CD • Linux can

Unix/Linux

2809 words - 12 pages UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains

Systems Analysis and Design

1244 words - 5 pages . Technologies applied The application is completely Web based and can be run in Linux as well as Windows Platform. (Payroll system, 2006) The technologies applied for different environment are as follows: Server End Development Environment * JDK 5 * Netbeans 6.0 java development tool * Sun java Glassfish Application Server V2 * Blaze DS 3.0 Libraries * Spring framework 2.5 * iReport 2.5 * Jasper Report * Mozilla Firefox

Operating Systems

3380 words - 14 pages also supports the Super VGA video Mode. Updating of both W2K and W7 can be done through a user update directly from Microsoft Corporation. RHV6 also has the ability to update the software using a package system. Security Red Hat Linux includes Resource access control, encrypted disk, integrated firewall, etc. anything to do with the security used on the operating system. Resource Access Control - Just like windows servers Red Hat servers

Andrew Tsai

920 words - 4 pages Forest BBS, Inc. - Lake Forest, CA June 1996 - June 1997 Software Engineer Developed fingerprint security applications using C++ and MFC.Developed programs interfacing between humans and fingerprint scanning hardware.Technical Skills Languages: C/C++, MFC/Visual C++, Pascal, Visual Basic, UNIX C, Html Platforms: IBM PC compatible, Mac, Cisco, Sun & UNIX Workstations OS: DOS, Windows 9x, Windows NT, Windows 2000, Mac OS, Sun OS, Unix, Linux

Wireless Network

2018 words - 9 pages radio waves for transmission. This paper will discuss how to handle wireless security in an organization. Currently, about 150 million organization world wide use wireless technologies. The technology is implemented to make advantages over other competitors and solving business problems. In learning institutions such as universities, wireless technology is widely used. Wireless network is used by lecturers and students to access

Feasibility Study

699 words - 3 pages 1. DESCRIPTION OF PRODUCTS AND SERVICES The IT department requires a system that will alert users when their desktop computer is no longer in compliance with current security standards; customer would be instructed to call the IT Help Desk for assistance before their service is cut off. System would need to be expandable to multiple networks and be compatible with Windows and Linux operating systems. There are no proposed changes to the

Related Essays

Operating System Essay

1125 words - 5 pages ) Kernel Performance: The core Linux operating-system kernel is entirely original and implemented as a traditional monolithic kernel for performance reasons. Kernel design is modular enough to allow most drivers to be dynamically loaded and unloaded at run time. The initial kernel does not have networking support, limited device driver’s support and basic virtual memory system included. Kernel is evolved with time by supporting technologies like

Linux Essay

1010 words - 5 pages bnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm Research Assignment 2.1 4/9/2012 Kathleen Cline | Research Assignment 2.1 Linux security technologies SELinux, chroot jail, and iptables For each security technology, explain what organization (if any) is behind it

Windows Linux Security Essay

5790 words - 24 pages responds to input from the user), raising the priority of interactive and I/O bounded processes and lowering that of CPU bound processes, to increase the responsiveness of interactive applications.[8] b- Memory Management Disk (Paging) Most hard drive installations of Linux utilize a "swap partition", a partition dedicated exclusively for paging operations. This reduces slowdown due to disk fragmentation 6- Security a- Malware More than 800 pieces

File Management Essay

2696 words - 11 pages there are three policies implemented by SELinux: Targeted- This policy applies MAC controls only to certain or named processes. MLS- This is multi-level security protection. Strict- This policy applies MAC controls to all processes. There are different types of Linux Security Technologies.   Discretionary Access Control, SELinux (Security Enhanced Linux), chroot jail, and iptables are just a few.   This paper is only going to discuss the