Premium Essay

Lunix

In:

Submitted By fiffer75
Words 345
Pages 2
1. (a) What is the Mandatory Access Control? Why is it better than Discretionary Access Control?
Mandatory Access Control (MAC) is under the control of the system administrator, which enforces the security policies that limit what a user or program can do. Discretionary Access Control (DAC) can only archive fine-grain control over which users and processes can access files and how they can be accessed. MAC is more secure and is a better choice.
(b) What are the three states of SELinux? * Enforcing/Active * Permissive/Warn * Disabled
(c) What selection in the left pane of the SELinux Administration window lets you change policy settings for SELinux?
Boolean
(d) What two file are used to configure TCP Wrappers? host.allow and hosts.deny (e) What keyword in TCP Wrappers matches any daemon or client?
All or Exact
(f) Given the following entry in TCP Wrappers what will happen when a client address 172.16.24.100 tries to access a Web site running on this server?
The IP matches both the access and deny hosts files. It will be allowed access because it matches the first hosts file that is checked.
(g) What is a chroot jail?
It is a process with a root directory other than /. Say you run a process or program and specify its root as /home/sam/jail, it would have no knowledge of any files above /home/sam. Jail is the root directory.
(h) When might a chroot jail not work?
Running a chroot utility with root privileges, and also using su or sudo programs. Those are compiled for Fedora/REEL and they call PAM, you would have to modify the source so it does not call PAM. Either one could lead to an unsecure jail.
(i) What is the name of the kernel component that uses the iptables rules to filter network traffic?
Netfilter
2. Create an iptables rule that will block all traffic from 10.14.34.207 and not let the sender know that the traffic was blocked.
#

Similar Documents

Premium Essay

The Tech-Slacky Howto

...THE TECH-SLACKY HOWTO Author: Santiago Romero http://www.escomposlinux.org/sromero/linux/pringao/techslacky-howto.html Translation: Javier Malonda (supervised by Antonio and Sinner from the Prairy) 30 de mayo de 2002 1. Introduction Welcome to the tech slacky-Howto! The present document is a practical guide to demonstrate the following universal truths: Windows is easy to install (even a child could do it); it’s just about clicking OK. Windows is easy to use (even a child could do it); you don’t need to know anything to start using windows. Windows can perform advanced tasks even if the user doesn’t know a word about computing; you don’t need to know what RAM is or how a computer works. Windows can be learned in a few minutes. It’s plug and play! Thanks to Windows, computers are now easy to use and this is why there’s a computer at each home. People wouldn’t be able to use computers if it weren’t for Windows. To demonstrate all the preceeding premises we will need the help of two special collaborators: Johnny Smartass (myself), an adorable 16 year old youngster son of the woman living at 1354 Evergreen Terrace, next house to... Ralph Jones, our just graduated in Computing Sciende after hard working years, GNU/Linux user and Free Software defender. 2. Required ingredients for the tech slacky-Howto In order to verify the premises exposed before we will need: A user who never owned a Personal Computer (Johnny Smartass in our example). A user with computing knowledge...

Words: 5972 - Pages: 24

Free Essay

Computer Intrusion Forensics

...Computer Intrusion Forensics Research Paper Nathan Balon Ronald Stovall Thomas Scaria CIS 544 Abstract The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investigation. It is not enough to simple know an attacker is responsible for the crime, the forensics investigation must be carried out in a precise manner that will produce evidence that is amicable in a court room. For computer intrusion forensics many methodologies have been designed to be used when conducting an investigation. A computer forensics investigator also needs certain skills to conduct the investigation. Along with this, the computer forensics investigator must be equipped with an array of software tools. With the birth of the Internet and networks, the computer intrusion has never been as significant as it is now. There are different preventive measures available, such as access control and authentication, to attempt to prevent intruders. Intrusion detection systems (IDS) are developed to detect an intrusion as it occurs, and to execute countermeasures when detected...

Words: 9608 - Pages: 39