Preview

IS3440 vlab 2 assesment wk 1

Powerful Essays
Open Document
Open Document
521 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3440 vlab 2 assesment wk 1
Assessment Worksheet
Configuring Basic Security Controls on a CentOS Linux Server

IS3440
Course Name and Number: _____________________________________________________

Annisa Fields
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________

Overview
In this lab, you secured a Linux server system. You secured the bootloader, enabled iptables firewall, and ran SELinux to help lock down the Linux OS. By securing the bootloader, you prevented access to single-user mode and the GRUB Console during the boot of the system. Enabling iptables and applying firewall rules ensured that only the applications you wanted can reach or reach out from your computer. You also applied access control lists (ACLs) to directories and files within the lab to secure the file and data access and then verified those permissions on the system.

Lab Assessment Questions & Answers
1. What is GRUB and why is it important to lock it down?
GRUB is a boot processor that allows a person to boot into other operating systems. It is important to lock down grub otherwise an outside person can boot into single user mode and gain root access.

2. Discuss the purpose of granting sudo access. Why is it a good idea not to log in as a root user?

3.

With sudo command is the same as the run as command in windows. It allows a person to run one command with root access while not being logged into the server as root. If a person logs into root they will have full access to the system and could purposely or accidently run
If
a file is set thekillimmutable commands thatwith would the server.flag, what security controls does this provide for

the file?

If a file is set with an the immutable flag it means that the it’s a file that not even the root user could delete if they tried.

4. Besides immutable, what are some of the other

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2. During the install, a password has been set for the “root” user, and when is it appropriate to use this account?…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    So how do you secure your connection and block unwelcome visitors and stay away? It doesn’t require you to become IT professionals but simple things will secure your system.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 1

    • 822 Words
    • 4 Pages

    2. During the install, a password has been set for the “root” user. What is the “root “user, and when it is appropriate to user this account.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Default operating system installations and configurations, are not secure. In a typical default installation, many network services which won’t be used in a web server configuration are installed, such as remote registry services, print server service, RAS etc. The more services running on an operating system, the more ports will be left open, thus leaving more open doors for malicious users to abuse. Switch off all unnecessary services and disable them, so next time the server is rebooted, they are not started automatically. Switching off unnecessary services will also give an extra boost to your server performances, by freeing some hardware resources.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Operating System

    • 1099 Words
    • 5 Pages

    Answer: d. It redirects the output of one command to the input of another command.…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Proper management of user accounts will ensure the information and access to devices on the network confidential.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays