Question

In: Computer Science

Question 2. Pick three security failures of Linux system and explain how you would address them.

Question 2. Pick three security failures of Linux system and explain how you would address them.

Solutions

Expert Solution

1. Open Network Ports

2. Insecure and Badly Configured Programs

The use of insecure programs (such as PHP, FTP, rsh, NFS, and portmap) in other than carefully controlled situations and failure to configure other programs properly continues to be a major security sin.

Most sysadmins know that POP and IMAP (unless wrapped in SSL), telnet, and FTP4 send passwords and data in the clear (unencrypted). They know that PHP, NFS, and portmap have a history of security problems, as well as design defects in their authentication.

Many system break-ins relating to Linux and Unix Web servers happen via insecure CGIs.

Implement rings of security in CGIs.

Try to design your application so that even if it finds a CGI vulnerability, the system is protected from major damage. One solution is to have CGIs just be front ends for a solidly written server running on a different machine. The more hurdles a hacker must jump to reach the goal, the more likely it is that he or she will stumble.

3. Weak password

A variation is to use ssh public keys to allow an account on one system to ssh into another system without supplying any password. At the very least, pick a moderately hard-to-crack password for your ssh keys. If you must have an automatic program use ssh without a password to ssh into another system, then create either a separate nonroot account on the target system or an alternate account with UID 0 but a login "shell" that does just what is needed, such as doing a backup.


Related Solutions

Question 3. Pick three security failures of Mac system and explain how you would address them.
Question 3. Pick three security failures of Mac system and explain how you would address them.
Question 1. Pick three security failures of Windows system and explain how you would address them.
Question 1. Pick three security failures of Windows system and explain how you would address them.
How would you rather address the problems in the social security program. Will you fix the...
How would you rather address the problems in the social security program. Will you fix the current problem that we have now or create a new system like a pre-funded system where everyone did have their own account that will be airmaked for them. Discuss any problems you see with either one of them and which one would you rather support.
Describe, in detail, a research question you could address using GenBank. Explain exactly how you would...
Describe, in detail, a research question you could address using GenBank. Explain exactly how you would use GenBank to answer your question. If you would need information beyond what is in GenBank, explain what information. If not, explain why not
Hi, I'm doing a presentation on this 2 question below. how would you explain this to...
Hi, I'm doing a presentation on this 2 question below. how would you explain this to question in under 2 minutes each? can you please explain and verify the answer so that I can understand it clearly. 1. Use put-call parity to relate the initial investment for a bull spread created using calls to the initial investment for a bull spread created using puts. 2. Explain how an aggressive bear spread can be created using put options
In a decision tree, how does the algorithm pick the attributes for splitting? Would you explain...
In a decision tree, how does the algorithm pick the attributes for splitting? Would you explain it logically and specifically?
Explain security and privacy issues in an organization and recommend on how to deal with them
Explain security and privacy issues in an organization and recommend on how to deal with them
Linux Commands 8.How would you find out information about systemdon your Linux workstation? 9.A user would...
Linux Commands 8.How would you find out information about systemdon your Linux workstation? 9.A user would like to put the firefoxprogram in the background –what would you type into the command prompt to do this? 10.For the program in above, how would you bring it back into the foreground? 11.What is the fork()function call? 12.In Linux what command sequence do we enter to stop a program? 13.What is the UIDcolumn in the output of the command ps -ef? 14.What is...
Question 1 Briefly describe how you would address these impacts when working with the Aboriginal and...
Question 1 Briefly describe how you would address these impacts when working with the Aboriginal and Torres Strait Islander people in your region.
Both these questions have three parts; please address all of them - 2. Identify ways a...
Both these questions have three parts; please address all of them - 2. Identify ways a company can move from a "commodity" position to one of a cost and/or value advantage. Is a commodity position always bad, and how can companies differentiate themselves in this position? 4. Provide business examples of the three operations strategies make-to-stock, assemble-to-order, and make-to-order. Explain what it would take for a company to move from a make-to-stock strategies to make-to-order, and vice versa. What are...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT