Introduction to Linux Host Security

Objectives
After completing this presentation, you should be able to: Define the importance of IT security Describe some common threats to IT security Define a basic security architecture model List common security services List Linux mechanisms for host security List general guidelines for security policies

we'd have to be born again with a new name to recover." A commercial bank executive .Why Protect Systems? "Our losses from terrorism could be as high as $50 million. Our biggest risk is losing our customers' trust.

Defining Security Reduction of risk Protection against threats .

Introduction to Security Architecture .

Security Model .

ISO 7498-02 Security Services Identification and authentication Access control Confidentiality Data integrity Non-repudiation Security management including audit .

Security Management Cycle .

Implementing a Security Policy As a system security administrator or implementer you: − Must understand how to evaluate a statement of security requirements Have a primary responsibility in managing the organization Are required to: − − Translate information used in creating the security policy Implement the policy to ensure fair treatment to every user Understand general guidelines for goals and policies .

Security Threats and Business Risks .

Other Security Threats .

System Mechanisms (1 of 2) Hardware User Group Password System resource management .

System Mechanisms (2 of 2) File management Log management Printing Backup and restore Auditing System monitoring Problem reporting Intrusion detection .

Linux Mechanisms Services and mechanisms covered in this course include: User administration Configuring access control Monitoring access control System file integrity (including devices and key management files) Delegation of authority (sudo) Accountability (auditing mechanisms) .

Linux Security Details User authentication Login process Login tracking Administrative roles with sudo Groups Access control lists File and directory permissions Security-related files Auditing .

There are many security communities for both discussion and information on topics ranging from Linux-specific security to more general UNIX security to OS independent security topics. Web sites are better for documentation and information. What you don't know can hurt you and your organization. Know your vulnerabilities. Mailing lists tend to be best for active discussion. those who would want to compromise your system certainly will. If you do not stay up-to-date with security you will be vulnerable. . Constant education is simply part of the job of maintaining an effective security policy.Staying Current with Security New security issues are discovered daily.

securityfocus.linuxsecurity.org/ http://www.Linux Security Web Sites http://www.org/faqs/computer-security/ .faqs.com/ http://lsap.com/ http://www.org/ http://www.cert.

linuxsecurity.org/ http://www.Linux Security Mailing Lists http://online.com/general/mailing lists.com/archive http://www.suse.com/mailing-lists/linuxsecurity/ http://www.html .securityfocus.redhat.com/us/support/mailinglists/ http://lists.insecure.

security http://www.linux.org/groups/ http://www.unix.li.security comp.os.redhat.counter.os.Other Sources of Information USENET newsgroups: − − comp.linux.org/ Local Linux user group directories − − − .com/apps/community/LUG/ http://lugww.

What You Will Learn Among the various mechanisms and facilities provided by Linux. we will cover the following topics: Installing Linux Identification and Authentication Access Control and Authorization Availability System Integrity Auditing Intrusion Management Application Security .

What Comes Next? TCP/IP network security Network services: − − − − − − Secure shell and secure copy Socks proxy Standard proxies DNS E-mail VPN Firewalls Network address translation .

What would you use to allow a trusted user to perform some specific system maintenance on a regular basis. What are the five main steps in the security management cycle? 3. What are some of the possible threats to system security? 5. instead of giving out the root password? 4. they may install a program that allows them to gain root privileges in a system.Checkpoint 1. Once intruders have infiltrated a system.What is this type of program called? . What are some of the possible losses due to a compromised system? 2.

Unit Summary Having completed this unit. you should understand: The importance of security to your organization The types of threats to look out for Some basic security concepts and ideas The major security features of Linux .

Sign up to vote on this title
UsefulNot useful