Preview

Unit 1&2 Discussion

Satisfactory Essays
Open Document
Open Document
379 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1&2 Discussion
Unit 1 Discussion 1: Securing a Linux System
Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be compromised based purely on a poor security configuration. Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers such as a WAF, IDS, or Mod Security to react in real time to various hacking and threats for HTTP requests. However, securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised. Default operating system installations and configurations, are not secure. In a typical default installation, many network services which won’t be used in a web server configuration are installed, such as remote registry services, print server service, RAS etc. The more services running on an operating system, the more ports will be left open, thus leaving more open doors for malicious users to abuse. Switch off all unnecessary services and disable them, so next time the server is rebooted, they are not started automatically. Switching off unnecessary services will also give an extra boost to your server performances, by freeing some hardware resources.

Unit 2 Discussion 1: Identifying Layers of Access Control in Linux
Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.

For example a 2-bit, access control level (levels 0 to 3) would typically be

You May Also Find These Documents Helpful

  • Good Essays

    unit 1

    • 367 Words
    • 2 Pages

    1. Identify four main points that would be included in a contract of employment. If possible, use an example contract to support your answer (feel free to obscure any confidential information).…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    6. What are some options according to PCI DSS to protect external facing web applications from known attacks?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    2. An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    UNIT 2

    • 470 Words
    • 3 Pages

    5.) Write the pseudocode for a program that will determine the average miles per gallon a car gets. (Inputs should be miles driven and gallons of gas used)…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit Two

    • 579 Words
    • 2 Pages

    2. What type of recording do you think would be the most useful to crime…

    • 579 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    free elc

    • 611 Words
    • 3 Pages

    Dean Marshall Consultancy's team of professional security experts understand web technology. As experts in the Joomla CMS, you can trust us to help you with all of your website security needs. Contact us now for our Joomla security services and we could harden the security of your existing website, offer security advice about your server set-up and best practise for website administrators.…

    • 611 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 1

    • 1725 Words
    • 7 Pages

    1. Identify four main points that would be included in a contract of employment. If possible, use an example contract to support your answer (feel free to obscure any confidential information).…

    • 1725 Words
    • 7 Pages
    Good Essays
  • Good Essays

    unit 1

    • 641 Words
    • 2 Pages

    Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Good Essays

    unit 1 2 and 3

    • 1651 Words
    • 1 Page

    1.1 There are many different reasons why people communicate ,people communicate to express needs or to share ideas and information also to reassure and express feelings another reason is to socialise and to ask questions. People communicate in order to establish and maintain relationships with others and to give and receive information and instructions and to understand and be understood as well to share opinions,knowledge, feelings and emotions.…

    • 1651 Words
    • 1 Page
    Good Essays
  • Good Essays

    Unit 2

    • 2029 Words
    • 5 Pages

    Unit 2 – Introduction to personal development in health, social care or children's and young people's settings…

    • 2029 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 1

    • 929 Words
    • 3 Pages

    It is vitally important for me as a teacher to keep up to date with legislation and any changes made to legislation. I will start with explaining what the difference is between a legislative requirement and a code of practice. A legislative requirement is a duty to act according to the law as defined in an Act of Parliament and is usually enforceable through the courts. Code of Practice is a set of rules outlining how a person in a particular profession is expected to behave. Finally a Statutory code of practice is a Code of practice approved by Parliament and admissible as evidence in any legal action.…

    • 929 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays