IS 3440 Lab#2 Assessment Worksheet
In this lab, you secured a Linux server system. You secured the bootloader, enabled iptables firewall,
and ran SELinux to help lock down the Linux OS. By securing the bootloader, you prevented access
Unit 2 Discussion 1: Identifying Layers of Access Control in Linux
Learning Objectives and Outcomes
You will be able to identify various layers of access control in a Linux server environment.
You will make security recommendations using different layers
Victoria Copas 04877394
Installing a Core Linux Operating System
The foundation of host based security starts with the installation of the operating system (OS).
Contrary to popular opinion, there is no such thing as a secure
IS3440 Linux Security
STUDENT COPY: Project
Linux-Based Web Application Infrastructure
The purpose of this project is to evaluate, research, and recommend particular solutions for a Linuxbased infrastructure, serving a financ