© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Security Strategies in Linux Platforms and.

Slides:



Advertisements
Similar presentations
The Property Management System and Interfaces
Advertisements

Introduction to Linux Video task 1. Five reasons to use Linux Data security Price Reliability It is modified for the needs of a user It is easy to use.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
© 2009 Avaya Inc. All rights reserved. Page 1 AT&T Mobile Extension with Avaya one-X Mobile.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Using SharePoint Server 2007 for Site and Enterprise Search at Monsanto Company Vincent L. Arter, Jr. Project Lead Portals and Collaboration Monsanto.
System Software Chapter 5 McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
System Software Chapter Describe the differences between system software and application software Discuss the four types of system software Discuss.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Managing Risk in Information Systems Lesson.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Managing Risk in Information Systems Strategies for Mitigating Risk
Android An open handset alliance project Janice Garcia September 18, 2008 MIS 304.
High-Level Assessment Month Year
Desktop Deployment Planning Service Quick Start Guidance READ the DDPS Delivery Guide for Consultants! – How each deck is structured – Best practices for.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Virtual Machine Management
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Network.
The Role of DBMS in Computing
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Network Lesson 8 Considerations.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
Systems Analysis and Design for the Small Enterprise Chapter 13 Networking.
Cloud computing.
TERA: PAMS Reporting By Michael McGuire
The Role of the Operating System
Appendix A Introduction to Using Linux. Objectives Linux introduction Commands-Line Interface Files and Directories Basic Commands The password Command.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Copyright 2014 Open Networking User Group. All Rights Reserved Confidential Not For Distribution Six Steps To A Common Open Networking Ecosystem Common.
Copyright Ó Oracle Corporation, All rights reserved Working with Other Canvases.
Chapter 6 An Introduction to System Software and Virtual Machines.
User Experience Search in context; actionable results; user tax from multiple search interfaces, and logons; no unified search results; People and Information.
Introducing Software Computer Concepts Unit A. Introducing Software What is an Operating System? OS is the master controller for all the activities that.
Elena Iancu. … describe future targets and the means to achieve them … describe future targets and the means to achieve them … facilitate collaboration,
Lawson Global Support Our Support Partnership Andrew Stephenson Lawson Global Support Working with Support Copyright ©
GNOME, KDE and X Windows. The GNOME Project was started in 1997 to produce a free (as in freedom) desktop environment. GNU Network Object Model Environment.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Copyright © Texas Education Agency, All rights reserved.1 Principles of Information Technology Understanding Types & Uses of Software.
BIF713 Operating System Concepts MS Windows. Agenda 1. What is an Operating System (definition)? 2. Types of Operating Systems 3. Basic Operations: –
2 Software.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
FileZilla Introduction to Web Programming Kirkwood Community College Fred McClurg © Copyright 2015, Fred McClurg, All Rights Reserved.
CSE434 Computer Networks The history and future of the Internet.
© 2002, Cisco Systems, Inc. All rights reserved..
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Operating Systems Concepts 1/e Ruth Watson Chapter 1 Chapter 1 Introduction to Operating Systems Ruth Watson.
Graphical User Interface.  A graphical user in terface (GUI) is often pronounced as ‘goo-ey’.  It is atype of user interface that controls a display.
2 Copyright © Oracle Corporation, All rights reserved. Basic Oracle Net Architecture.
Cover slide Project, course, team, date. Outline welcome  1 slide introducing the key sections/ information items in this presentation.
Macintosh & Linux Used to fill in pg 5 & 6 of “Operating Systems” Packet.
System Center 2012 Configuration Manager
CompTIA Server+ Certification (Exam SK0-004)
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
“Basic Linux/UNIX Command Line”
Chapter 4 – Introduction to Operating System Concepts
Getting Started With Linux
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
IT Infrastructure: Hardware and Software
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
Name: Date: Year 10 to 11 review Welcome back: Lawson.
IT Infrastructure: Hardware and Software
Graphic Libraries for The User Interface
Presentation transcript:

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and Applications Lesson 15 Best Practices and Emerging Technologies

Page 2 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Learning Objective and Key Concepts Learning Objective  Describe best practices for keeping Linux up to date and future changes to Linux security. Key Concepts  Best practices for keeping Linux software up to date  Corporate and community support  Future changes in Linux security

Page 3 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. DISCOVER: CONCEPTS

Page 4 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Gold Baselines

Page 5 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. DISCOVER: PROCESS

Page 6 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Best Practices

Page 7 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Best Practices (Continued)

Page 8 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. DISCOVER: ROLES

Page 9 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Support Options

Page 10 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. DISCOVER: CONTEXTS

Page 11 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Future Trends  Nftables Will replace iptables  More mandatory access controls AppArmor SELinux  Penetration testing tools  Single sign-on

Page 12 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. DISCOVER: RATIONALE

Page 13 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Which Support Community?  The group behind the application  The developers of the distribution  The group behind a graphical user interface (GUI) desktop environment

Page 14 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Summary  Best practices for keeping Linux software up to date  Corporate and community support  Future changes in Linux security