Instructor: Michael Teske BI222.  Lab follow up  Current events  Linux/Unix best practices  Project Management.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Operating System Customization
DESIGNING A PUBLIC KEY INFRASTRUCTURE
System Hardening Borrowed from the CLICS group. System Hardening How do we respond to problems? (e.g. operating system deadlock) Detect Detect (Detect.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Host-Based Intrusion Detection software TRIPWIRE & MD5.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Microsoft ® Official Course Module 9 Configuring Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
UNIX ™ /Linux Overview Unix/IP Preparation Course June 9, 2013 Lusaka, Zambia.
Services and Disk Management. Default Services (some) Alerter ClipBook Server Computer Browser DNS Client Event Log Messenger Net Logon Network DDE Network.
Hands-On Microsoft Windows Server 2008
CSN08101 Digital Forensics Lecture 1B: Essential Linux and Caine Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak.
system hardening Act of modifying a system to make it more secure Protecting against internal and external threats Usually a balance between security.
Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
UNIX ™ /Linux Overview Unix/IP Preparation Course May 25, 2014 Djibouti.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Module 7: Managing the User Environment by Using Group Policy.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
New SA Training Topic 6: Service Management Our organization takes advantage of many service type to provide functionality to users and ease management.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CHAPTER 2. Overview 1. Pre-Installation Tasks 2. Installing and Configuring Linux 3. X Server 4. Post Installation Configuration and Tasks.
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
What is a port The Ports Collection is essentially a set of Makefiles, patches, and description files placed in /usr/ports. The port includes instructions.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Phil Hurvitz Securing UNIX Servers with the Secure.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
Security fundamentals Topic 2 Establishing and maintaining baseline security.
SCSC 455 Computer Security Chapter 3 User Security.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
VMware ESX and ESXi Module 3.
Backing Up Your System With rsnapshot
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Mail Server Basic.
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
CompTIA Server+ Certification (Exam SK0-004)
FTP - File Transfer Protocol
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Lecture 13 RPM and its advantages.
CompTIA Server+ Certification (Exam SK0-004)
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Chapter 10: Device Discovery, Management, and Maintenance
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
IS3440 Linux Security Unit 8 Software Management
Operating System Security
LO3 – Understand Business IT Systems
Convergence IT Services Pvt. Ltd
Presentation transcript:

Instructor: Michael Teske BI222

 Lab follow up  Current events  Linux/Unix best practices  Project Management

 Questions/comments from lab

 Discussion

 Open source  Excellent business case with good ROI  Low acquisition/growth costs  Lower facilities costs

 Open source  Which applications are available?  Vendor commitment  Support?

 Free? ◦ Just download it ◦ Pay for support?  How much will it save you? ◦ Difficult to generate firm cost savings projections ◦ “Too good to be true” numbers easy to produce

 Administration ◦ User accounts ◦ Network configuration ◦ Change management ◦ Backups  FUD (fear, uncertainty, and doubt) ◦ Skills ◦ Lawsuits

 Skills availability  Uniqueness/risk  Fear/emotion  Is it? ◦ Secure ◦ Stable ◦ Profitable  Biggest issue: “culture clash” between departments

 Mission-critical vendor applications may not be supported  Consider alternatives ◦ Many exist ◦ Cost savings may justify change

 Standard procedures  Proven techniques  What is the goal? ◦ Reliability ◦ Availability ◦ Supportable ◦ Performance ◦ Security  Measurable results

 Services  Security  Up to date

 Configuration

 Services commonly installed on systems are inherently dangerous  Server should not be running services not required ◦ R* services ◦ Printer services ◦ Mail Server ◦ Telnet ◦ FTP ◦ And more…

 Manual # default: off # description: The rsync server is a good addition to an ftp server, as it \ # allows crc checksumming etc. service rsync { disable = yes socket_type = stream wait = no user = root server = /usr/bin/rsync server_args = --daemon log_on_failure += USERID }

 Physical security  Operating System  Application(s)

 Who has access?  How do they have access?  Can you “secure” it?  Do you have any control over this?

 Installation  Configuration  Maintenance

 Where  What  How

 Where to start? ◦ Sudo!  Where do we go from there? ◦ Applications? ◦ Basic configuration?

 One concern with multiple Linux machines is maintaining root passwords  Same password on all machines?  Having to remember multiple passwords?  When performing tasks across multiple machines ◦ Consider sftp a file to 75 machines…

 Protect startup?  Uncontrolled system shutdown never causes problems (true?)  Possible data loss after uncontrolled shutdown even after fsck

 What  Where  Checking

 logins.def  limits.conf  rc.local

 Accounts without passwords  Accounts whose passwords are identical to the account name  Accounts with overly simplistic passwords ◦ (ex , ABCDEFGH, password, qwerty, etc)  Enforce aging of passwords when possible  Use strong passwords

 Network configuration ◦ TCP/IP configuration different  Like any system, housekeeping and maintenance require effort, new tools

 Determine a user’s identity and permission  Managing authentication for many instances may become difficult  Typical result ◦ Resistance to updates ◦ Multiple instances not kept in sync

 Secure Shell (SSH) uses PKI to enable secure connections  Very useful for maintaining root access on many instances ◦ Using ssh-agent on original client, can set up environment such that password needs to be entered only once

 Monitor  Firewall  Intrusion Detection

 Calculate real storage needs

 YUM ◦ Open Source program to manage package (product) installation ◦ Used to install add-ons ◦ Used to update packages ◦ Think “InstallShield for Linux”  Most packages available as RPMs ◦ RPMs not just used by Red Hat ◦ Alternatives: tarball or custom executable ◦ Other less elegant solutions

 You need to verify that downloaded packages are what you think they are ◦ Could have viruses/Trojan horses in them  RPMs are digitally signed, avoid “man-in-the- middle” alteration  Also include package metainfo ◦ Where and when created, by whom ◦ Level, support, description, license, etc

 Dependency information included (other required libraries, products) ◦ No DLL issues ◦ Tools exist to help find dependent RPMs on the Internet  Disk space requirement aggregation ◦ Precalculates space required including RPMs and by dependencies ◦ No surprises 98% through an install

 RPM-installed packages can be deleted very cleanly  Enable system recoverability ◦ What if accidental edit breaks critical file?  rpm –V lets you know if RPM-installed files have been altered since installation

 Numerous types  Source RPMs are generally architecture- independent  Can aid in porting to new architectures ◦ Just try to build it, see if it compiles

 Some applications actually just use RPM as wrapper, non-RPM installer  RPMs can be poorly built ◦ Bad dependencies ◦ Files might be installed in inappropriate locations ◦ Might not work with some distributions  General learning curve ◦ Building RPMs is non-trivial

 What  How

 Infrastructure ◦ Apache ◦ DNS ◦ Samba ◦ MySQL ◦ ◦ Etc…  Applications of all types

 You want to build a house  Where do you start?  There are many tasks to be completed  A task like the “basement” has sub-tasks ◦ Dig hole ◦ Pour footings  This is referred to as work breakdown structure

Network Applications © Paul Massey, 2008