AFA CyberCamp Module 4. Day One Cyber Safety Day Two Windows System Administration Day Three Intermediate Windows Security Day Four Intro to Linux and.

Slides:



Advertisements
Similar presentations
Mercury Quality Center 9.0 Training Material
Advertisements

1. Reasons for logging on as a root •Most people are familiar with Windows systems with regard to administrative privileges. Many user running windows.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
Microsoft Windows Vista Chapter 6 Customizing Your Computer Using the Control Panel.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
User Accounts and Permissions Chapter IV / Part II.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Site Training Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
L INUX C OMMAND L INE I NTERFACE G UNAANBAN.G
1. This presentation covers :  User Interface Administration  Files System and Services Management 2.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Ch 11 Managing System Reliability and Availability 1.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
Session 5: Working with MySQL iNET Academy Open Source Web Development.
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Securing Windows.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
CENT 305 Information Systems Security Linux Introduction.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Unix Operating Systems Module 7. Unix Operating System Versions Basic Information User and Group Settings File Permissions Local Firewall Local Security.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Module 6: Configuring User Environments Using Group Policy.
Guide to Linux Installation and Administration1 Chapter 4 Running a Linux System.
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
CHAPTER Creating and Managing Users and Groups. Chapter Objectives Explain the use of Local Users and Groups Tool in the Systems Tools Option to create.
Chapter 10: Rights, User, and Group Administration.
Security Planning and Administrative Delegation Lesson 6.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
NetTech Solutions Security and Security Permissions Lesson Nine.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
® Microsoft Office 2010 Exploring the Basics of Microsoft Windows 7.
SCSC 455 Computer Security Chapter 3 User Security.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
Windows customization
Guide to Operating Systems, 5th Edition
CyberPatriot Competition!
Appendix A Introduction to Windows 7
CSC227: Operating Systems
TOPSpro Special Topics
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
An Introduction to Computers and Visual Basic
Chapter 11: Managing Users
9 Linux on the Desktop.
Introduction to Computers
To Join the Teleconference
Devote 5-10 minutes to explaining the CyberPatriot Competition System (Instruction Slides 3-4). Allow hours for students to work on the competition.
IS3440 Linux Security Unit 3 User Account Management
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Optimizing Efficiency + Funding
Windows 7                      .
Exploring the Basics of Microsoft Windows 7
Bethesda Cybersecurity Club
Figure 6-13: Managing Permissions
Presentation transcript:

AFA CyberCamp Module 4

Day One Cyber Safety Day Two Windows System Administration Day Three Intermediate Windows Security Day Four Intro to Linux and Ubuntu Security Day Five CyberPatriot Competition! AFA CyberCamp Format 1

1. Ubuntu Terminology and Concepts - Become familiar with important vocabulary and navigating the Ubuntu interface 2.Basic GUI Security - Apply key security principles to an Ubuntu system in the Graphic User Interface 3. Intro to Command Line - Understand command line syntax and explore making commands through code 4.Basic Command Line Security - Use command line to make account management settings 5.Intermediate Ubuntu Security - Make intermediate security settings using command line and the GUI 2

Ubuntu Terminology and Concepts

Account types: User and Root Root - Linux Administrator account Requires password in GUI and command line Authentication Authorization The Root Account 4 Source:

Different than Windows Example: – Windows: C:\Documents\hello.txt – Linux: /home/CyberPatriot/hello.txt Log in to the image – User: cyberpatriot – Password: CyberPatriot! Important folders: – /home – /boot File system 5

Software is bundled into packages Packages are managed by package managers Click the Ubuntu Software Center in the left-hand menu Adding and Removing Software 6

Cons Not as user-friendly Harder to multitask Pros Provides the user more control Only option for some tasks Just need a keyboard Uses fewer resources Can be made easier with scripting Command Line (Terminal) 7 Source:

Open the Ubuntu Demo Image in VMware Player – User: cyberpatriot – Password: CyberPatriot! Complete the tasks outlined in your workbooks Do not change any passwords or user account settings Activity 4-1: Linux Familiarization Lab Instructions (Workbook Pages 17-18): 8

Basic GUI Security

No Control Panel like in Windows Click the System Settings in the left-hand menu Basic Linux Security 10

To make changes, unlock and authenticate. Keep Automatic Login off To Change user Type, click the field next to Account Type Click User Accounts User Accounts 11

Click the field next to Password Click the first option next to Action to change a user’s password Do not use the second option Click the third option to disable a user’s account User Account Passwords 12

Installing Updates 13 Click the Ubuntu button in the left-hand menu and search for Update Manager

Three Important Tabs – Ubuntu Software – Other Software – Ubuntu Update Policy 14

Manual Selection of Updates Install Updates Update Policy 15

Built-in Firewall (UFW) Not activated by default Command line interface Gufw Local Firewall 16

Search → Firewall Configuration → Unlock → Status On Default: – Deny all incoming traffic – Allow all outgoing traffic Reject Preconfigured Rules GUFW – Customizing Settings 17

Activity 4-2: GUI Security Lab Open the Ubuntu Demo Image in VMware Player – User: cyberpatriot – Password: CyberPatriot! Complete the tasks outlined in your workbooks Do not change any passwords or user account settings Instructions (Workbook Page 19): 18

Intro to Command Line

First Command Line Walkthrough 20 Open the Home folder

Close the Home folder Click Ubuntu Button at top of left-nav menu → Search “ Terminal” → Open Terminal 1. Open the Terminal 21

Type cat > hello.txt Hit Enter 2. Create Text Document 22

Type This is a test. Hello World! Type Ctrl+D 3. Add Text to Document 23

Close the Terminal Open the Home Folder Double-click the hello.txt file 4. View Document in the GUI 24

Open the Documents folder Second Command Line Walkthrough 25

Close the Home folder Click the Ubuntu button in the left-hand menu and search for Terminal 1. Open the Terminal 26

Type cat –n > /home/cyberpatriot/Documents/hello2.txt Hit Enter 2. Create Text Document 27

3. Add Text to Document 28 Type This is another test. Hello Again! Hit Enter Type Ctrl+D

Close the Terminal Open the Home Folder Navigate to the Documents folder Double-click the.txt file 4. Open Document in the GUI 29

Rules that govern how command are written Similar to English grammar The boy pet the dog. Subject – The boy Verb – pet Object – the dog. Command Syntax 30

cat –n > /home/cyberpatriot/Documents/hello2.txt Command: cat Option: -n Operator: > File Name/Location: /home/cyberpatriot/Documents/hello2.txt Format depends on the command Command Syntax 31

This command must be used to perform administrative tasks Example: adding a user –Type adduser archimedes – Hit Enter The sudo Command 32

Sudo Command Option 1: –Type sudo adduser archimedes – Hit Enter and Authenticate –Type a password for the user. You can add the other details but they are unnecessary. – Hit Enter sudo Command Options 33 Sudo Command Option 2: –Type sudo su – Hit Enter and Authenticate –Type adduser riemann – Hit Enter –Type a password for the user. You can add the other details but they are unnecessary. – Hit Enter

Activity 4-3: Command Line Lab 34 Complete the tasks outlined in your workbooks Do not change or delete anything not listed in your workbooks Instructions (Workbook Page 20):

Basic Command Line Security

One of many text editors Syntax: gedit [filepath] Root permissions occasionally required Type gedit hello.txt The gedit Command 36

Turned on by default LightDM: display manager controlling the login screen Type gedit /etc/lightdm/lightdm.conf Add the line allow-guest=false to the file Turn off the Guest Account 37

Used for logon and applications Simplifies user authentication 4 types: – Account – Authentication – Password – Session PAM Files /44/03/ _500X500.jpg

Type gedit /etc/pam.d/common-password The Password File 39 Password history: Add “ remember=5” to the end of this line. Password complexity: Add “ ucredit=-1 lcredit=-1 dcredit=-1 ocredit=-1” to the end of this line. Password length: Add “ minlen=8” to the end of this line.

Type gedit /etc/pam.d/common-auth Add this line to the end of the file: auth required pam_tally2.so deny=5 onerr=fail unlock_time=1800 Account Policy 40

Type gedit /etc/login.defs More Password Policy Maximum Password Duration: Minimum Password Duration: Password Warning Before Expiration: PASS_MAX_DAYS 90 PASS_MIN_DAYS 10 PASS_WARN_AGE 7 41

Intermediate Ubuntu Security

Lists the contents and properties of a file or directory Syntax: ls [option] [filepath] –l option Type ls –l hello.txt The ls Command 43 Owner Group Size Date Modified File Links

10 characters – 1. File Type Directory – d File – ‘-’ – 2-4. Owner File Permissions (Blank 2) Read - r (Blank 3) Write/modify - w (Blank 4) Execute – x – 5-7. Group File Permissions – Other File Permissions Files Permissions -rw-rw-r-- 44

Allows you to change file permissions Syntax chmod [filepath] Type chmod o-r hello.txt Type ls –l hello.txt The chmod Command [u,g or o][+ or -][r,w or x] 45

Similar to Windows Event Viewer From the Search field, type System Log Four types of logs – auth.log: Tracks authentication events – dpkg.log: Tracks software events – syslog: Tracks operating system events – Xorg.0.log: Tracks desktop events Can add different types of logs System Logs 46

Unlike Windows, auditing is not set up by default in Ubuntu Three step process – To install, type apt-get install auditd – To enable, type auditctl –e 1 – To modify, type gedit /etc/audit/auditd.conf Audit Policies 47

Work very similarly to Windows To list all groups: cat /etc/group To add a group: addgroup [groupname] To add a user to a group: adduser [username] [groupname] Groups 48

Can be run in the GUI To install, type apt-get install bum To run, type bum Services 49

Activity 4-4: Command Line Security Lab 50 Complete the tasks outlined in your workbooks Do not change or delete anything not listed in your workbooks Instructions (Workbook Page 21):

Ubuntu and other Linux operating systems are both very similar and very different to Windows operating systems Ubuntu is vulnerable to many of the same problems as Windows systems Securing Ubuntu requires some knowledge of the command line environment Linux Conclusion 51