Preview

Linux Security Lab 2

Satisfactory Essays
Open Document
Open Document
304 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Linux Security Lab 2
1. What is the significance of creating Groups and adding Users to Groups?
By creating groups you can get people access to the information that they need to get to. When a user is created and added to a group that user then has the access permissions of the group that has been made.
2. Given a scenereo where there are 5 database admins that may periodically need access to a given system. Discuss a better concept to better manage the admins access permissions.
Break down admin responsabilities and only give them the access for what duties they need to perform. PAM command is a great idea in this scenereo.
3. New web admin account has been set up and a password provided. What is the command to force a password change upon login.
Chage –d 0
4. What is the purpose of the “SU” command.
This is the command to get into the machine as ROOT. (Super User I like to call it) this is like the ultimate authority command to change what you want and equally allows you to screw things up if you want.
5. Restricting the use of the “SU” command can be configured using what mechanism.
/etc/pam.d/su to edit the PAM. Edit the #auth required pam_wheel.so use_uid
6. What is the purpose of the login.defs file? Creates accounts and is site specific for the shadow login. This has rules like expirations, password requirements.
7. What is the PASS_MIN_DAYS setting? Min days until you have to change the password
8. What is the PASS_MAX_DAYS setting? Why is it good to set this? Max days to change your password. This is a great idea to force people to change passwords and if they don’t then the account goes bye bye.
9. NO
10. Make group, use login.defs, set max days

You May Also Find These Documents Helpful

  • Satisfactory Essays

    7. How is the passwd file used, and what fields make up its content? Explain.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.) Change control manager enforces change of things passwords. Password change policies makes things difficult for hackers. It’s Brute force attack.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Com 135 Week 5 Analysis

    • 678 Words
    • 3 Pages

    Check the user's password strength. Use the Week 3 You Decide as the data for this section.…

    • 678 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Authorization Rules: Controls will be configured to ensure access is approved for only company/corporate employees. These controls will be set up based off of the position (job roles) of the employees to ensure they can only access what is required to allow them to perform their duties. The policy will include group membership policies as well as authority-level policies. The employee access will be assigned to the appropriate groups and authority- level policies.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Don’t use only one password for all your online accounts. It is risky. Online criminals and hackers could potentially gain access to your accounts if they figure out such password. You should rather use distinct passwords for all your accounts.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Click the link below to obtain your username or to get a new password.…

    • 1335 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Sap Exercises

    • 30536 Words
    • 123 Pages

    Once you have pressed enter, the system will prompt you to change your password the first time you log on to the system.…

    • 30536 Words
    • 123 Pages
    Powerful Essays
  • Satisfactory Essays

    Project Proposal for Cms

    • 500 Words
    • 2 Pages

    On a network, access to databases is dependent upon the number of Users with User ID's and protected passwords.…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country, it should be very apparent why an organization like NSA had such an interest in heading up development of a more secure way to better protect our nation’s computer systems. In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting.…

    • 1126 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Role Mining - Revealing Business Roles for Security Administration using Data Mining Technology Martin Kuhlmann Dalia Shohat SYSTOR Security Solutions GmbH Hermann-Heinrich-Gossen-Strasse 3 D 50858 Cologne [martin.kuhlmann|dalia.shohat] @systorsecurity.com Gerhard Schimpf SMF TEAM IT-Security Consulting Am Waldweg 23 D 75173 Pforzheim Gerhard.Schimpf@smfteam.de ABSTRACT In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems. The core of this paper creates a link between the use of well established data mining technology and RBAC. We present a process for detecting patterns in a data base of access rights and for deriving enterprise roles from these patterns.…

    • 5822 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    User setup and passwords are maintained by the Systems Support Team (please contact telephone number Customer Services 01332 868900) please see: Figure 8. Password Maintenance…

    • 539 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Tally 7

    • 881 Words
    • 4 Pages

    This option allows you to alter information about the existing company, you can modify any information at any time that is set while creating a company.…

    • 881 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It reduce all Efforts of any user to remember all id’s ,passwords they have and facilitate to use single id and password.…

    • 1346 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Tourism

    • 649 Words
    • 3 Pages

    * If user forgets password. He can get a new password by answering security question which is given the registration process.…

    • 649 Words
    • 3 Pages
    Good Essays

Related Topics