Hello Everyone, Can you please review my Assignment; - you/review/A4tfAfjjEei52Q6_FzKPcg Thank you! Peer-graded Assignment: A new hire - you! Welcome to fort knox! Utilizing the information that you have learned over the past 4 weeks, the goal of this assignment is for you to play the role of a Linux system administrator and be able to discuss how you would protect a new Linux system from attack while also meeting business requirements. This is a reasoning assignment. Discuss why you are making one decision over another. Step-By-Step Assignment Instructions Assignment Narrative: Suppose that you were just hired by a medium size company. You are replacing a previous system admin that really didn't understand what they were doing. Your supervisor would like you to suggest ways of building and protecting their Linux server environment based off of your interview (based off of what you learned in this course). They are proposing the following for a new business venture and would like you to help. The criteria are below. Proposed business requirements from your supervisor: How would you solve business requirement 1, both technically and securely? 1- Technical: The best approach for the Web, User, Log and Database servers is to setup and run Linux CentOS 7. Making sure to keep the servers lean and fast to access, by installing only those Packages that are really needed to run the servers optimal. Security: Make sure Security-Enhanced Linux (SELinux) is turned on and the right modes of operation a set appropriately on all servers. Secure Console Access by disabling the booting from external devices and set BIOS and grub boot loader passwords to protect these settings. Restrict using Old passwords by using PAM module. Make sure all ports are secure by checking listening ports. These can be used by hackers to gain access to your servers. A good port example is port 22 for SSH (Secure Shell), it best to change it to a less obvious number, say 1243. Disable Root Login and responding to pings. Enable the Firewall UFW and install Fail2Ban to monitor the authentication logs of various programs.
You've reached the end of your free preview.
Want to read all 4 pages?
- Fall '19