Premium Essay

Reserch Assignment 2.1

In: Computers and Technology

Submitted By kmcgraw
Words 938
Pages 4
Research Assignment 2.1
Kyle McGraw
ITT Technical Institute
IT302 Linux
Mr. Gort
April 14, 2012

In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them.
Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before the SElinux policy during access attempts. If the standard permissions deny access the access is denied so therefore SElinux is not involved. When the standard file permissions do allow access, the SElinux policy will be consulted and access is either gained or denied based on the security contexts of the source process and the targeted object.
During the development of Version 7 Unix in 1979

Similar Documents

Premium Essay

Linux Technology

...Reserch Assignment 2.1 Research Assignment 2.1 Kyle McGraw ITT Technical Institute IT302 Linux Mr. Gort April 14, 2012 In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system...

Words: 940 - Pages: 4

Premium Essay

Factors Influencing the Consumer Buying Decision of Mobile Phone in Malaysia

...MARKETING RESEARCH METHODS ASSIGNMENT 1 (RESEARCH PROPOSAL) Factors influencing the consumer buying decision of mobile phone in Malaysia Group Members: Word count-2579 1.1 Introduction 1.1 Background With recent advancements in technology, the term mobile phones become obsolete and is replaced with the word ‘smart phones’, which has adjusted its position as the ‘new information medium’ (May and Hearn, 2005), due to the ever increasing convenience and features, such as, MMS, GPS, video call services and many more, allowing society itself to shift towards smartphone purchases (Min, et al., 2012). AC Neilsen (2012) reported that Malaysia is ranked highly in its region for smartphone usage, a total of 27%, while the closest contenders have only a slight difference in percentage (Thailand, 28% and Philippines, 29%). Furthermore, the perception of smartphones being a luxury item or a status symbol shifts to it being viewed as a necessity to daily life (Walsh and White, 2006) may have added the increase in usage rates, this can be supported by a study conducted by Syed Yahya Kamal, Syed Ardi and Tasir, Zaidatun (2008), which reported that mobile phones were viewed as a necessity by university students as it changed the methods of learning in universities. For example, info graphic research showed that out of the 57% mobile phone users, 40% use their phones to study before exams (Alexander, 2011). Furthermore...

Words: 6959 - Pages: 28

Premium Essay

Passport of the Future

...MSc thesis Information security Passport of the Future: Biometrics against Identity Theft? Marijana Kosmerlj NISlab Høgskolen i Gjøvik marijana@erdal.biz 30 June 2004 Sammendrag Formålet med biometriske pass er å forhindre ulovlig adgang av reisende inn i et land og å begrense bruken av forfalskede reisedokumenter ved en mer nøyaktig autentisering av reisende. Etter den 11. september 2001 har interessen for bruk av slike biometriske pass økt kraftig. Biometriske pass vil bestå av et høykapasitets smartkort som vil inneholde et bilde av passinnehaveren i tillegg til annen type identitetsinformasjon. I passkontrollen vil ett foto bli tatt av passeieren og sammenlignet med fotoet lagret i passet. Et systemdefinert parameter vil avgjøre om disse to fotoene er like nok til å fastslå om personen i de to fotoene er en og samme person. Mange utfordringer er knyttet til biometriske systemer slik som feilrater, “spoofing”angrep, ikke-universalitet og interoperabilitetsproblemer. Forskningen har vist hvor lett det er å lure biomtriske systemer ved bruk av for eksempel statiske foto. Denne rapporten går ett skritt videre og tar en nærmere titt på fiender og deres ressurser i et grensekontrollmiljø. Den tradisjonelle måten å beregne feilakseptraten til biometriske systemer på, vil ikke gjenspeile den virkelige feilakseptraten i dette miljøet. For eksempel, vil andelen av fiendene som har minst tyve ”look-alikes” i målpopulasjonen sett fra et biometrisk system’s perspektiv være...

Words: 15324 - Pages: 62

Premium Essay

Jhiuh43Qgoij

...MNUALLL/301/0/2013 Tutorial Letter 101/0/2013 General tutorial letter for proposal, dissertation and thesis writing MNUALLL Year module Department of Health Studies IMPORTANT INFORMATION: This tutorial letter contains important information about your module. Note: Copyright pertaining to Mouton (2006) has been ceded to Unisa CONTENTS Page 1 2 2.1 2.2 2.3 2.3.1 2.4 2.5 2.6 2.7 2.8 3 3.1 3.2 3.3 3.4 3.5 4 4.1 4.2 4.3 4.4 4.5 4.6 5 5.1 5.2 5.2.1 5.2.2 2 WELCOME ................................................................................................................................... 6 SECTION 1: BEING REGISTERED FOR THE RESEARCH PROPOSAL MODULE (RPM) .... 7 Introduction ................................................................................................................................... 7 Application .................................................................................................................................... 7 Registration for Research Proposal Module (RPM) ...................................................................... 7 Registration................................................................................................................................... 8 Appointment of supervisor ............................................................................................................ 8 Guidelines for writing a proposal ...............................................................................................

Words: 30137 - Pages: 121