Chapter 09

Chapter 09 - Linux Networking and Security Chapter 9 User...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Linux Networking and Security Chapter 9 User Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
User Security Follow good password security practices Understand Linux Pluggable Authentication Modules (PAM) Use common utilities to promote user security Set up user access to system administration tasks with sudo
Background image of page 2
Managing Password Security One of the ways to access services on a Linux system is to log in as a user on that system The user must have a valid user account The user must enter the password corresponding to that user ID Selecting good passwords and keeping them secure is crucial to good system security
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Selecting Strong Passwords Passwords must not be written down, especially not anywhere near the computer to which they provide access Passwords must be chosen carefully so they can be remembered without a written aid Passwords should not include easily guessed words or numbers Users should be taught to never to tell anyone their password
Background image of page 4
Selecting Strong Passwords Ideas for creating good passwords: A minimum of eight characters should be sufficient It should include at least one number or symbol It could be one or more words separated by one or more symbols or numbers Multiple words works better if they are foreign or altered so that they do not appear in a dictionary Using a series of numbers or a pattern of altered letters can make it easier to remember your password
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Selecting Strong Passwords Using strong passwords reduces the possibility of a cracker utilizing social engineering to gain access to your system Crackers can resort to brute force attacks where all possible combinations are tried until one succeeds in guessing a password Some system administrators use password cracking tools to randomly test the strength of user’s passwords
Background image of page 6
Managing Linux Passwords Linux includes several facilities for managing passwords and enabling security measures When a new user account is added to the system, a single line is added to the /etc/password file, but the actual encrypted password is stored in /etc/shadow The shadow password file controls the username, the encrypted password data, last password change date, password expiration date, account expiration date, and more
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/03/2008 for the course IT IT taught by Professor Freebourn during the Spring '07 term at Montana Tech.

Page1 / 29

Chapter 09 - Linux Networking and Security Chapter 9 User...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online