This website uses cookies to ensure you have the best experience. Learn more

Securing A Linux Server Essay

571 words - 3 pages

Erik Thompson
IS3440
21 Sep 2015
Unit 1 Discussion 1
Securing a Linux System

As the significant prevalence of Linux web servers globally grows, security is often touted as strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place. Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be ...view middle of the document...

For small and large businesses, having a site or blog of your company serving up malware from a compromise is a loss of business and creates a very poor reflection of your company’s IT services on the public as well as potential clients.
Using network address translation and port address translation is the first recommended step. Since database products use predefined default ports, it is the first thing hackers look for, and hence should be changed. Even though the database IP address and port is not exposed to the outside world, it is a best practice to change it, to keep spyware and viruses away. Any standard firewall nowadays provides NAT and PAT features.
Securing SMTP transmissions can be done by both validating incoming mail & using a mail relay. The validation of incoming mail will check the incoming mail for an authorized address, and discard it if not found. Mail relay allows e-mail received by your e-mail server to be passed onto the intended recipient even if that user is not registered on your server. If you do need to have relay enabled, your best option is to allow it for authenticated users only. Authentication is done either via IP address or user id and password.
The last is the file server for customers’ loan applications and other personal data files. TCFS (Transparent Cryptographic File System) works as a layer under the VFS (Virtual File system Switch) layer, making it completely transparent to the applications. The security is guaranteed by means of the DES (data encryption standard) algorithm. Keys are kept in a special database which stores keys encrypted with the user's login password. To maximize the level of security, it is best to keep to a minimum number of trusted entities. A TCFS user needs to trust only the kernel and the superuser of the client machine accessing the data.

Other Papers Like Securing A Linux Server

Project Part 2 Task 1 Essay

588 words - 3 pages Project Part 2 Task 1: Secure File Storage Server Scenario There is a requirement to read customer confidential data located in the local area network (LAN) of First World Bank Savings and Loan. The organization needs to deliver highly confidential customer data in Portable Document Format (PDF) format for its online customers. This data is typically uploaded to a Linux file server by the bank employees within the LAN. However, online

History of Linux Essay

901 words - 4 pages ,[16][30] and have secured a place in server installations often using the popular LAMP application stack.[31][dead link] Use of Linux distributions in home and enterprise desktops has been growing.[32][33][34][35][36][37][38] Linux distributions have also gained popularity with various local and national governments. The federal government of Brazil is well known for its support for Linux.[39][40] News of the Russian military creating its own

Linux

1010 words - 5 pages , contributed to the development of the linux Security modules kernel patch, and adapted the SELinux prototype to LSM. Now the MITRE Corporation enhanced several common utilities to be SELinux-aware and developed application security policies and documentation for the Apache web server, Sendmail, and crond. They also developed a policy analysis tool (SLAT) and a policy generation tool (polgen). These were the original contributors. The SELinux kernel

Homework Assignment 2.1

1186 words - 5 pages ” distributions are really distributions of GNU/Linux. 3. List and describe in detail four advantages of Linux. Applications – Linux is both free and commercial as well as a wide variety of tools: graphical, word processing, networking, security administration, Web server and many others. Flexibility - Linux can be used for high performance server applications, desktop applications, and embedded systems. You can save disk space by only installing the

Computer Oss Comparison Essay

1900 words - 8 pages this was not possible so he began to create Linux. In the beginning Linux did not offer a lot of features and seemed to be lacking in ability (Diedrich, 2011). Torvalds made Linux 0.01 available to the public via an FTP server on September, 17, 1991. Linux 0.01 had a good reception among people who liked using MINIX or UNIX but found those OS’s to either to be too limited or too expensive for their needs. This spawned a new culture which

Is3440 Linux Security Lab 1

1514 words - 7 pages Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing

Linux Security

448 words - 2 pages status as preferred supplier • Meet more tender expectations by demonstrating compliance You could use a third party Data-Center and the Linux based software and reduce the cost and utilizes many open source programs from the internet for free. We know from the team what must be utilized; a database server, a web server, a file server, a simple mail transfer protocol (SMTP), and a lightweight directory access protocol (LDAP) server. These

Operating System Analysis Paper

4124 words - 17 pages , hibernation, and dump files. Installation and Activation is quite different than that of Windows XP. Any version of Windows Server 2008 can be evaluated without a product key. However, failing to activate within ten days will cause the system to shut down every hour due to the licensing service (Microsoft, 2010). Linux The system requirements for Red Hat Linux are very light. These are the minimum hardware requirements and they may be enough to

Os Comparision

4790 words - 20 pages investment incentives, we also present a short case study comparing Windows vs. Linux along three dimensions: the client-side, the server-side and the interaction between the client-side and the server-side. We emphasize that the comparison between Windows and Linux is an issue of comparing two competing software ecosystems, not just two products. The existing Windows ecosystem of the operating system, applications, application developers and

Linux Versus Windows NT

1007 words - 5 pages Linux versus Windows NT Forget the browser wars. This year's big nerd battle is the server shootout between Linux and Windows NT - and it's not just a bunch of geeks nit-picking. While both offer more affordable platforms for Web service than in the past, Linux and NT are polar opposites on almost every other level. They look different, run differently, support different software, and cost money in different places. So far though, most press

Unit 1 Research Paper

1627 words - 7 pages Michael Malate June 23, 2013 SP2520 Unit 1 Research Assignment 1: Exploring Programming Languages From the looks of it there seems to be 14 different revisions of the SQL standard. * SQL Server version 1.0: SQL Server version 1.0 is a 16 bit server modeled in the year 1989 for supporting OS/2. * SQL Server version 1.1: SQL Server version 1.1 is also a 16 bit server designed in the year 1991 to support OS/2. * SQL Server version

Related Essays

Linux Server Apps In Corporate Business Ops

729 words - 3 pages server, it can be run without the video requirements that are needed with GUI interfaces. In this aspect, energy can be saved due to the processor not having to work overtime to refresh the pages for every GUI change. Also with Linux, you are not restricted to wait on Microsoft for bug fixes or patches for vulnerabilities. A corporate business can hire in-house Linux programmers, code writers, security personnel and administrators to handle the

Linux Introduction An Basics Essay

1506 words - 7 pages Enterprise Linux and Ubuntu - a commercial vendor Popular Linux Distributions ♦ Red Hat Enterprise Linux (RHEL) ► Number of versions ► Most popular • Red Hat Enterprise Linux (RHEL) – 2 CPUs • Red Hat Enterprise Linux Advanced Platform (RHELAP) - unlimited ► ► ► Corporate organizations as server platforms Started as volunteers (now Fedora) Uses RPM packaging system ♦ CentOS ► A derivation of the Red Hat Enterprise Linux ► Available at no

Difference Between Servers And Workstations Essay

276 words - 2 pages In this paper I am supposed to describe the differences between a server, and a workstation. I will provide a few comparisons that will be able to show you these differences. While looking into these comparisons, I have realized there are not too many similarities of the two. So the following is the information that I have found while looking the information up about servers, and workstations. Let’s start with the definition of the

Technological Innovations Essay

1517 words - 7 pages this freedom, Linux has been integrated tenfold into the technological innovations that we experience and take for granted each and every day. Linux in your life Have you used the internet? Chances are you have accessed a website that is running a Linux based web server. Statistically speaking, around 60 percent of all websites on the internet are running an open source program named “Apache” (Davis, 2002). Whether it is indirectly via the