This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 1 UNIX Security UNIX Security CNIT 34000 – Lecture 09 UNIX Security UNIX is fundamentally insecure TCP/IP was designed to maximize connectivity – not limit it Weak authentication model Limited authorization model Basically, UNIX was developed before security was an issue Our mission is to reduce the risk associated with running a UNIX system Backup Backing up the system is the first step in securing it If the system is ever compromised (or experiences a hardware failure) the backup can be restored Many UNIX derivatives can backup the entire system onto a bootable tape Allows for very easy re-installation Just boot from the tape and tar the files back to their original location Simple solution is to tar the system tar –cvf tarfile /file/sys/to/backup Can be ran automatically through crond Account Security Use shadow passwords Check the default accounts help, mail, who, uucp, system Kill any non-required accounts Open accounts Accounts with no password nobody, guest Account Security...
View Full Document
This note was uploaded on 05/07/2010 for the course CNIT 340 taught by Professor Rawles during the Fall '09 term at Purdue University.
- Fall '09