Free Essay

Lab 1 Is3440 Linux Security

In:

Submitted By handymanlus
Words 1158
Pages 5
---------------------------------------------------------------------------------------------------------------------
1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time?
The most interesting importance of NTP would be the auto key system, if your system doesn’t keep correct time a attacker who needs to change time so that a replay attack can happen could be very damaging, that is why today’s version of NTP shields against this in several ways.

2. During the install, a password has been set for the “root” user, and when is it appropriate to use this account? It is highly recommended that you only use this account when there are tasks that require root privileges such as moving files or directories into or out of system directories.

3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Windows Environment. Explain the purpose for this recommendation? In a production environment hardware requirements and not to run the X-Windows Environment may sometimes vary, X-Window is intended for primarily workstation use only example personal computing on a Linux box. The X-Window was intended and developed for the network GUI only, X-Windows by itself doesn’t even have an interface.

4. During the install process it asks what the options given to create the partition are? Name them? It asked would I like to create Primary or an extended partition once I decided that I had to tell Linux how big was the partition was going to be which I was giving the lines of First Cylinder. First Cylinder shows me the amount of free space I created earlier so after I decide that a new option of Last Cylinder appeared. Last Cylinder asked select the default value that I selected during the First Cylinder process then next I had to tell FDISK what kind of partition I have.

5. Why is it important to partition a Linux System Correctly?
It is very important to partition a Linux System properly because of varies reasons first would be the ease of use; installing a partition on your Linux system properly makes it easier and less complicated to recover corrupted files or a operating system installation. Other importance of a partition of a Linux System would be great performance, security, backup and recovery, stability and efficiency, and the most important would be testing. Testing is important because it would be best to boot multiple operating systems such as Free BSD, Linux, and Windows. There are different types of partitions on Linux such as /usr, /var, /tmp, /boot, /home.

6. What is the significance of the SWAP partition in a Linux System? What different ways can the swap partition space be configured, and why would you recommend one over the other?
Temporary space $, its swapping information between the memory and the disk. By using SWAP partitions, server performance can be greatly improved, I recommend Swap over other partitions because even though it makes my physical RAM slower it actually works. There are several ways to configure the swap partition for example if I have a 0KB as a swap partition and I want to configure swap space to 2GB, first I would create a SWAP partition of 2GB with Fdisk then I would create the file system such as mkswap / dev/ hdaX) and finally add a new entry to the /etc/fstab file.

7. What are some of the benefits and features that are available to Linux users by selecting the “ext4” file system for Linux partitioning?
Features for Linux users includes Sub second timestamps, Journal checksumming, Defragment support, Large 16T file system support, Space reallocation, and Large >2T file system. Benefits for users are better file system support, faster checking, and better stability for desktop and server needs.

8. How is the passwd file used, and what fields make up its content?
The passwd file is used to keep to in track of every user on the system. This file consist of your user name, real name, identification information, and much more. The fields that make up its content are Rachel, eH5/.mj7NB3dx, 181, 100, Rachel Cohen, and /u/rachel, /bin/ksh.

9. What is the fstab file used for and what fields make up its content?
This file keeps in track of disk devices and there mount points on the UNIX directory tree. There are six fields that makes up its content which are device name, mount point, file system type, options, dump, and needs checked.

10. Explain the significance of creating separate partitions of the /var and /boot directories? What is contained in those directories? /Var contain files that are expected to grow such as system logs, packages and database files, emails, print queues, and lock files. /Boot files contain boot loader related files only such as Kernal intitrd, vmlinux, and grub files. /Var cannot be made as a separate partition is it often best to move /var out of the root partition and into the /usr partition. The /Boot Directory is much different and can be a separate partition. Here are the steps; create a partition and format on ext4 or ext2, copy contents from old /Boot folder to new partition root, Edit fstab with a separate boot entry, and run grub-install for the new boot location which would be using the (boot-directory=option).

11. How would selecting the option “encrypt file system” be useful? It is very useful simply to avoid someone attacking your personal information so “encrypt file system” has great security counter measures; this file system has always protected data files within the system.

12. How can portioning with the Logical Volume Manager (LVM) help as it relates to the C.I.A. Triad of security?
Keep everything up to date and make sure all applications are running perfectly.

13. What security advantages can be realized when selecting the “minimal” software install option? If I install the minimal of applications such as a smart phone will use less disk space the more applications I install will make my network slow, it will be best to check your process and if there are any applications running you should kill them immediately.

14. How could you automate a fedora install geard for security?
If I use yum to install hacking tools I can simply install a shell chip or create a script and automate in a script so only a certain amount of applications install automatically.

15. What is the purpose of “first boot”? The purpose of a “first boot” is a program that runs after installing Fedora, the “first boot” enables us to configure and set up language, display welcome screen, license screen, as well as giving us the option to choose a keyboard layout, create your personal root password, setting up networking, security level, configuring time zone and date.

Similar Documents

Premium Essay

Is3440 Linux Security Lab 1

...Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator for...

Words: 1494 - Pages: 6

Free Essay

Is3440 - Unit 1 Lab Assessment Sheet

...Assessment Worksheet Installing a Core Linux Operating System on a Server IS3440 - Linux Security Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview The foundation of host-based security starts with the installation of the operating system (OS). Contrary to popular opinion, there is no such thing as a secure operating system, but in this lab, you learned how to install the Linux CentOS operating system in a secure manner. You created a new virtual machine, partitioned the hard drive, and installed the Linux operating system. You also created a non-root user account and verified that key services were (or were not) running. Lab Assessment Questions & Answers 1. During the Minimal install, NTP (Network Time Protocol) server was not installed. From a security perspective, why is it important for a system to keep accurate time? To keep the system in sync and up to date for logging purposes such as any incidents that occur. Otherwise a time may not be correct when checking logs for an incident. 2. During the install, you set a password for the root user. What is the root user, and when is it appropriate to use this account? The root user is the system administrator. It is only appropriate...

Words: 503 - Pages: 3

Premium Essay

Test

...Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110 ...

Words: 2305 - Pages: 10