linux-security - Computer Security: Principles and Practice...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Computer Security: Principles and Practice EECS 710 Professor: Dr. Hossein Saiedian Presented by Ankit Agarwal Chapter 23 Chapter 23 Linux Security Linux Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Outline Introduction Linux Security Model Linux File-System Security Linux Vulnerabilities Linux System Hardening Application Security Mandatory Access Controls
Background image of page 2
3 Introduction Linux – Unix like computer OS that uses Linux kernel created by Linus Torvalds in 1991 evolved into a popular alternative to Win and MAC OS has many features and applications desktop and server OS, embedded systems hence wide variety of attacks possible various security tools available it uses Discretionary Access Control Model Mandatory Access Controls implemented to make up for DAC shortcomings SELinux and Novell AppArmor
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Outline Introduction Linux Security Model Linux File-System Security Linux Vulnerabilities Linux System Hardening Application Security Mandatory Access Controls
Background image of page 4
5 Linux Security Model Traditional security model people or processes with “root” privileges can do anything other accounts can do much less Goal of hackers – to gain root privilege Linux can be run robust and secure many system admins. fail to use the security features add-on tools like sudo and Tripwire available Crux of the problem – Discretionary Access Control
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Linux Security Transactions
Background image of page 6
7 Outline Introduction Linux Security Model Linux File-System Security Linux Vulnerabilities Linux System Hardening Application Security Mandatory Access Controls
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Linux File System In Linux everything is a file I/O to devices is via a “special” file e.g. /dev/cdrom points to /dev/hdb which is a special file have other special files like named pipes a conduit between processes / programs since almost everything a file – security very important
Background image of page 8
9 Users and Groups Users and Groups are not files users someone or something capable of using files can be human or process e.g. lpd (Linux Printer Daemon) runs as user lp groups list of user accounts user’s main group membership specified in /etc/passwd user can be added to additional group by editing /etc/group command line -> useradd, usermod, and userdel
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Understanding /etc/passwd 1. username : Used when user logs in. It should be between 1 and 32 characters in length. 2. password : An x character indicates that encrypted password is stored in /etc/shadow file. 3. user ID (UID) : Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. UID 100-999 are reserved by system for administrative and system accounts/groups. 4.
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/05/2011 for the course CS 2105 taught by Professor Ana during the Fall '09 term at National University of Singapore.

Page1 / 51

linux-security - Computer Security: Principles and Practice...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online