Download presentation
Presentation is loading. Please wait.
Published byAnnice Hines Modified over 8 years ago
1
UNIX OS Security
2
“The original UNIX OS was not designed with the levels of security that most corporate and educational users now demand.” -Administering Security on the Solaris Operating System
3
Securing the OS User and password security Root access Network services Remote access
4
Insecure Passwords mookie1 fireman1 1monopol CATFISH hello7 bella19 happy katie1 shanthi! phd123 puppy1 1mother ri8412 NO PASSWORD moose1 mcrs1
5
“SEVERAL SPECIES OF SMALL FURRY ANIMALS GATHERED TOGETHER IN A CAVE AND GROOVING WITH A PICT” - Pink Floyd Password : S$o$fagTi@cagW@P A Secure Password Password : Hp$0N21f32[ or
6
Root Access “I need root access to run my program. Can you give me the root password?”
7
NO!
8
Controlling Root Access Role-Based Access Control (RBAC) Access Control Lists (ACL) PowerBroker Sudo
9
Network Services LDAP NIS/NIS+ DHCP WEB DNS CDE Sendmail SSH/Telnet FTP Printing NTP
10
Remote Services SSH (v2)-Secure SFTP/SCP-Secure Telnet-Insecure FTP-Insecure rlogin-Insecure
11
How do I know if I am secure? -Security Audits -User Audits -File System Audits
12
Intrusion Detection Systems -Network Based IDS -Host Based IDS
13
Host Based IDS Tripwire Aide
14
Detecting Network Scans SNORT Courtney
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.