LINUX SECURITY Dongmei Wu ID:103712 8/25/00.

Slides:



Advertisements
Similar presentations
Computer Security set of slides 10 Dr Alexei Vernitski.
Advertisements

IDPS (Intrusion Detection & Prevention System )
Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Security+ Guide to Network Security Fundamentals
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 Host Based Intrusion Detection: Analyzing System Logs Bob Winding, Vikram Ahmed University of Notre Dame 12/13/2006.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
T RIP W IRE Karthik Mohanasundaram Wright State University.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Host Security CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE.
Linux Networking and Security
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Mark Shtern.  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Securing the Linux Operating System Erik P. Friebolin.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
Network Security and Cryptography
1 6 Further System Fundamentals (HL) 6.4 Further Network Fundamentals.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
Understanding Security Policies
CSCE 548 Student Presentation By Manasa Suthram
Cyber Security Types of Threats How an attack happens
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
Big Picture How many ways can a system be attacked? What can we do about it?
תרגול 9 – Windows Security
Backtracking Intrusions
CompTIA Security+ Study Guide (SY0-501)
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
Intrusion Detection Systems (IDS)
ISMS Information Security Management System
Figure 1-7: Eavesdropping on a Dialog
امنیت اطلاعات و ضرورت آن
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
Host Security CSCI N321 – System and Network Administration
Introduction to the course
Identity & Access Management
Implementing Client Security on Windows 2000 and Windows XP Level 150
Intrusion Detection system
Welcome to all Participants
Understanding Security Policies
Protection Mechanisms in Security Management
Introduction to Course
Presentation transcript:

LINUX SECURITY Dongmei Wu ID:103712 8/25/00

Agenda Overview Physical Security Local Security Files and File system Security Password Security and Encryption Kernel Security Network Security  Conclusion

Overview Developing A Security Policy Means of Securing Your Site Host Security Local Network Security

Physical Security Computer locks BIOS Security Boot Loader Security xlock and vlock Detecting Physical Security Compromises

Local Security Creating New Accounts Root Security

Files and Filesystem Security File Permissions Integrity Checking

Password Security and Encryption Public-Key Cryptography SSL “Crack"

Kernel Security As the kernel controls your computer's networking, it is important that it be very secure, and not be compromised. To prevent some of the latest networking attacks, you should try to keep your kernel version current.

Network Security Packet Sniffers System services Verify Your DNS Information Firewalls

Conclusion No computer system can ever be completely secure. The more secure your system is, the more intrusive your security becomes.