Course Hero Logo

PsLA W8.pdf - Linux Worksheet 8 Student Name: Pratham...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 5 pages.

Linux Worksheet 8Student Name:Pratham ChauhanUID:20IBC1014Branch:BCASection/Group:3/bSemester:4Date of Performance:19 April22Subject Name:Linux Administration LabSubject Code:20CAP256Aim/Overview of the practical:Implementation of SELinux.Task to be done:Que1.How do I temporarily turn off enforcing mode without having to reboot? What arethe access control attributes used by SELinux type enforcement security to controlaccess? What portion of the attribute is used by type enforcement for accesscontrol?What are the access control attributes used by SELinux type enforcementsecurity to control access? What portion of the attribute is used by type enforcement foraccess control?Que2.To check Is SELinux enabled or not then disable and enable SElinux and checkthe status. How do I enable/disable SELinux protection on specific daemons under thetargeted policy? How do I turn enforcing on/off at boot? How do I temporarily turn offenforcing mode without having to reboot?Concept used:Security Enhanced Linux (SELinux) provides an additional layer of systemsecurity. The standard access policy based on the user, group, and otherpermissions, known as Discretionary Access Control (DAC), does not enablesystem administrators to create comprehensive and fine-grained security policies,such as restricting specific applications to only viewing log files, while allowingother applications to append new data to the log files.BENEFITS OF RUNNING SELINUXa) All processes and files are labelled. SELinux policy rules define how processesinteract with files, as well as how processes interact with each other. Access is onlyallowed if an SELinux policy rule exists that specifically allows it.b) Fine-grained access control. Stepping beyond traditional UNIX permissions thatare controlled at user discretion and based on Linux user and group IDs, SELinux
access decisions are based on all available information, such as an SELinux user,role, type, and, optionally, a security levelc) SELinux policy is administratively-defined and enforced system-wide.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 5 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Mandatory Access Control, Implementation of SELinux

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture