Free Essay

Unit 2 Discussion

In:

Submitted By mozurjus
Words 568
Pages 3
Unit 2 Discussion 1: Identifying Layers of Access Control in Linux
Learning Objectives and Outcomes * You will be able to identify various layers of access control in a Linux server environment. * You will make security recommendations using different layers of access control.
Assignment Requirements
Really Cheap Used Computers, Inc. is an online seller of old school computers. The organization’s e-commerce Web site runs on a Linux server. The server is located at the organization’s local office in Boston, Massachusetts. The company has experienced tremendous growth and has hired you as the new security analyst. You access the server and find that there are virtually no layers of security other than the passwords set for user accounts.
Discuss at least three layers of access control that can be put in place on this server to create a more secure environment. Rationalize whether the given scenario represents discretionary access control (DAC) or mandatory access control (MAC).
Participate in this discussion by engaging in a meaningful debate regarding your choices of the three layers of access control in Linux. You must defend your choices with a valid rationale. Summarize your thoughts in a Word document and submit it to your instructor.

Required Resources
None
Submission Requirements * Format: Microsoft Word * Font: Arial, Size 12, Double-Space * Citation Style: Chicago Manual of Style * Length: 1–2 pages * Due By:Unit 2
Assessment Checklist * The student demonstrated a basic understanding of access control mechanisms. * The student was able to identify and differentiate between the different layers of access control.

One of the most vital security tasks is to maintain control over incoming network connections. As system administrator, there are many layers of control over these connections. At the lowest level unplug network cables, but this is rarely necessary unless your computer has been badly cracked beyond all trust. More realistically, you have the following levels of control in software, from general to service-specific:
Network interface - The interface can be brought entirely down and up.
Firewall - By setting firewall rules in the Linux kernel, you control the handling of incoming (and outgoing and forwarded) packets. This topic is covered in Chapter 2.
A superdaemon or Internet services daemon- A superdaemon controls the invocation of specific network services. Suppose the system receives an incoming request for a Telnet connection. The superdaemon could accept or reject it based on the source address, the time of day, the count of other Telnet connections open... or it could simply forbid all Telnet access. Superdaemons typically have a set of configuration files for controlling your many services conveniently in one place.
Individual network services - Any network service, such as sshd or ftpd, may have built-in access control facilities of its own. For example, sshd has its AllowUsers configuration keyword, ftpd has /etc/ftpaccess, and various services require user authentication.
These levels all play a part when a network service request arrives. This is considered a DAC (Discretionary Access Control) as it is not something the individual user controls as they are not an administrator, which only SELinux and AppArmor are examples of systems using MAC’s.
Works Cited
Jang, Michael H.. "Basic Components of Linux Security." In Security strategies in Linux platforms and applications. Sudbury, MA: Jones & Bartlett Learning, 2011. 28-50.
"Linux.com." Linux.com. https://www.linux.com/news/enterprise/systems-management/305234-five-things-to-know-about-linux-security- (accessed March 31, 2014).

Similar Documents

Premium Essay

Unit 2 Discussion

...• Explain why the demand for the good or service provided by a firm is elastic or inelastic. How does the elastic or inelastic demand influence pricing decisions by the firm to maximize profit? What are the impacts of elastic demand and inelastic demand on total revenue? McConnell, Brue & Flynn (2014), talk about the demand law, in which consumers will tend to buy the product with the cheaper price. So to understand the response of consumer to a price change, we need to measure its price elasticity of demand. Price elasticity helps a firm or business to understand how changes in price of a product will impact the total sales of the product. This allows us to determine the prices of different products that will yield maximum profit. Elastic Demand: if the percentage change in price of a product causes a larger percentage change in the quantity demanded. The types of services in this category are normally that of luxury, where customers can live without buying them, should a price increase occur. Inelastic Demand: Is the opposite, were a change in price causes a lesser percentage change in demand. The types of services or products that would normally fall under this category would be those of necessity. So regardless if a price hike, the consumer will still buy the service or product. Maximizing profit: For a company to maximize profits, it must either sell more or increase prices. So if a company increase the price of a product and yielded a less demand in quantity, then...

Words: 490 - Pages: 2

Premium Essay

Discussion Board Unit 2

...Discussion Board Unit 2 Comp101/1401B Introduction to Computers A. Questions for weekly discussions and conversations. 1. Why are clip art libraries useful, not only in Word , but also in PowerPoint? Clip art libraries are useful to show pictures to your words. They are great for making your documents or slide shows more exciting. Clip art actually can draw attention to get the readers to focus on the project or document itself. 2. What are the copyright laws that must be followed when using clip art? The right of legal use of clip art depends on the intent of the copyright owner. Copyrighted clip art is off limits for commercial use unless you have a written agreement with the copyright holder. For instance, if you sold Nike products in your store, you would have the right to use their logo for advertising. If you didn’t sell Nike products then it would be illegal for you to use their logo without permission. 3. When might it not be appropriate to use clip art? Clip art probably wouldn’t be appropriate in legal and professional documents. It wouldn’t be professional if clip art was used. B. If you have not used clip art before, find 2 sites on the internet, and provide at least 1 example of when each site could be used in a practical way. Include the type of clip art found at the sites, including categories or special interest areas for the site. The first site that caught my eye was ClipartHeaven.com. The clip art ranges from...

Words: 343 - Pages: 2

Free Essay

Unit 2 Discussion 1

...Unit 2 Discussion 1: Familiar Domains As an IT Admin you mainly deal with all seven domains, but the ones I deal with currently are work station, user domain and remote access. In any environment that you work with any of these 7 domains countermeasures are needed. It’s very important to make sure your network is secure and there are quite a few actions to take to ensure that it is safe as possible. Although no domains are 100% secured it’s always good to make sure all updates and patches are up to the most recent. I will also name a few other ways to protect certain domains in a typical IT infrastructure. Some countermeasures to take for user domain are making sure to have all users aware of security. Also have restricted access for a company’s terminal server and observe abnormal employee activity. Anti-virus is also needed to make sure the computers servers aren’t infected with malicious programs that cause loss in important documents. With a work station you can add a firewall to prevent unwanted traffic from infiltrating the network. Ensuring that your workstation has the latest service packs and patches update will also help protect any holes that could lead to hacking. Also with remote access it’s good to make sure only that person has access to certain files and must keep their password secure and not make a weak password so it does not get compromised. All these countermeasures...

Words: 267 - Pages: 2

Free Essay

Discussion Board Unit 2

...Unit 2 DB Subjective Probability “ A probability derived from an individual's personal judgment about whether a specific outcome is likely to occur. Subjective probabilities contain no formal calculations and only reflect the subject's opinions and past experience.” (investopedia.com, 2013) There are three elements of a probability which combine to equal a result. There is the experiment ,the sample space and the event (Editorial board, 2012). In this case the class is the experiment because the process of attempting it will result in a grade which could vary from an A to F. The different grades that can be achieved in the class are the sample space. The event or outcome is the grade that will be received at the end of the experiment. I would like to achieve an “A” in this class but due to my lack of experience in statistical analysis, my hesitation towards advanced mathematics, and the length of time it takes for me to complete my course work a C in this class may be my best result. I have a 1/9 chance or probability to receive an “A” in the data range presented to me which is (A,A-,B,B-,C,C-,D,D- AND F). By the grades that have been posted I would say that the other students have a much better chance of receiving a better grade than mine. I have personally use subjective probability in my security guard business in bidding on contracts based on the clients involved , the rates that I charge versus the rates other companies charge and the amount of work involved...

Words: 344 - Pages: 2

Premium Essay

Nt2640 Unit 2 Discussion

...address of 192.168.12.233 with the default class mask, which other host is on my directly connected network? a. 192.168.14.234 b. 192.168.11.230 c. 192.168.12.1 d. 192.168.12.257 e. None of the above 2. Given the IP host address of 10.28.2.45 with the default class mask, which other host is on my directly connected network? f. 10.29.2.48 g. 10.28.244.254 h. 10.1.34.44.89 i. 10.238.1.54 j. All of the above 3. Given the IP host address of 172.16.200.93 with the default class mask, which other host is on my directly connected network? k. 172.16.4.94 l. 172.15.3.66 m. 172.18.5.111 n. 172.45.100.230 o. All of the above 4. Given the IP host address of 129.01.20.43 with the default class mask, which other host is on my directly connected network? p. 129.02.88.122 q. 129.08.20.44 r. 129.199.50.92 s. 129.01.202.55 t. None of the above 5. Given the IP host address of 191.253.10.77 with the default class mask, which other host is on my directly connected network? u. 191.253.01.77 v. 191.254.10.78 w. 191.252.10.01 x. 191.253.189.43 y. Multiple Answers Section 2 – Routing Table and Next-hop Selection...

Words: 632 - Pages: 3

Premium Essay

Hlth400: Unit 2 Discussion Board

...Grade Received, "A" Beliefs and values, norms, folkways, and mores, and subcultures are the basic elements of an organizational culture (Fottler, Ford, & Heaton, 2010). I feel that an employee should be fired if they do not meet the organization’s organizational culture. We all know that every individual has his/her own beliefs; however, if the person does not match the beliefs and values of the organization, problems can arise. If an organization says that they are focused on their consumers and when the employees interact with consumers they are rude and inconsiderate, the consumer may not return. I worked in a nursing home as a CNA for almost two years. Our patients all were elderly and had Down’s syndrome. Our organizational culture was to treat each patient with dignity and respect, as well as giving each patient their right to privacy. We were all trained on these beliefs, as well as all of the HIPAA rules. Our facility hired a young girl to work the floor as a CNA as well. I caught her making fun of one of our consumers with one of her friends. I turned her in, and she was fired on the spot, no questions asked. Like I stated before, I do believe that an employee should be terminated if they do not meet the organization’s culture. I also believe, however, that if the employee is trained properly, they should have a chance to get their attitudes in check. Once given that second chance, if they still do not meet the organization’s culture, then they should...

Words: 316 - Pages: 2

Free Essay

Hlth410: Unit 2 Discussion Board

...Grade Received, "A" Within healthcare, there are several types of abuse. Some of these types of abuse include: emotional and verbal abuse, financial abuse, physical abuse, sexual abuse, psychological abuse, etc (Fremgen, 2012). Although abuse not only happens in the healthcare setting, I will be focusing on abuse in a hospital setting. In this assignment, I will focus on abuse in a mental hospital. This happens a lot more often than one would think. The type of abuse within the scenario I am about to present is sexual, physical, and psychological. A young woman is admitted into a mental hospital for depression, and she is beaten and raped by two of the orderly men that work there. Once the girl is released from the mental hospital, she becomes very depressed, and reaches out to local police to report the attack and rape. The police then become very concerned about her state of mind, and end up transferring her back to the same psychological facility. Once she arrives, she is restrained to the bed, and diagnosed as being suicidal. An ITO is ordered, and against her will, she is given medication. After she spends three weeks in this hospital, she is discharged to her parents; however, the treatment that she was given in the psychological facility is continued at her parent’s house as well. The girl begins to find it difficult to study her lessons, and her grades begin to go from As to Fs. The medication makes it hard for her to concentrate and comprehend her lessons...

Words: 507 - Pages: 3

Free Essay

Unit 2 Discussion Board for Advanced Entrepreneurship

...The URL address to the ad that I will be discussing is: http://advertisementfun.blogspot.com/2011/06/sprite-ice-blue.html The advertisement that I have chosen is for the beverage Sprite Ice Blue. This is a new product recently created by Sprite. I feel that the intent of this advertisement is to satisfy a need, or in this case, the consumer need for a cold thirst-quenching beverage (Lambing & Kuehl, 2007) (Sprite Ice Blue, 2011). I feel that the advertisement was alright, and that it would grab the attention of the consumer that saw the ad. I feel that the ad is effective because it depicts a young female that seems to be frozen and happy all at the same time. This shows consumers that drinking Sprite Ice Blue is cool, cold, and exciting to our taste buds (Sprite Ice Blue, 2011). This Sprite Ice Blue ad targets the teenage to young adult generations. The lifestyle for these generations is usually easy-going and fun-filled. With an ad like this, the targeted social class would more than likely vary. I feel like it would target both the middle and lower classes. I don’t see the upper class people paying much attention to an ad of this nature. The persuasive technique being used in the ad is humor as well as shock appeal. When I first saw the ad, I actually laughed out loud. This ad shows a female that is frozen solid and sticking her blue tongue out. The shock appeal is the way that the female looks, and the humorous part is that she is frozen and is sticking out...

Words: 408 - Pages: 2

Premium Essay

Unit 2 Bu224 Microeconomics Discussion Post

...Economics studies how people, acting as individuals or in groups, decide to use scarce resources to satisfy wants. This fundamental economic concept of scarcity is at the core of the discipline. There are never enough natural resources, human resources, or capital resources (man-made goods such as tools, equipment, machinery, factories) to produce everything society wants. Therefore, choices must be made on what to produce, how to produce, and for whom to produce. Choices must also be made at a personal level. There never seems to be enough money or time to have or to do everything one wants. Economics is a way of thinking, a science of making choices. Economists examine the decision-making processes of individuals, businesses, markets, governments, and economies as a whole. An understanding of economic principles helps people to consider not only the short-term effects of a decision, but also its long-term effects and possible unintended consequences; to see the connections between personal self-interest and societal goals; to understand how individual and social choices are made in the context of an economy; and to analyze the impact of public policies and events upon such social goals as freedom, efficiency, and equity. Because of increasing interdependence and globalization, everyone in the United States needs to be aware of the issues in the global economy, their role in that system, and be able to respond to changes so that they can effectively maintain...

Words: 1012 - Pages: 5

Premium Essay

Unit 2 Discussion Board for Financial Management

...Financial ratios are significant in terms of comprehending how a business is doing financially. My co-workers and I are working for a finance business and we have been talking about the advantages of the different financial ratios. Our job is to name four different financial ratios and why they are significant to both banks and investors. The business that I have chosen to discuss is the Coca-Cola Company. As I was investigating their Website as well as the investors’ part of the Website, I came across Coca-Cola’s financial documents for 2008. The documents that I came across included: income statements, balance sheets, as well as the cash flow statements. While calculating the market value ratio for Coca-Cola, the P.E. ratio is 22.02, and the market to book value ratio is simply a scope of how costly stocks are (Brooks, 2010) (Financial Statements, n.d.). The larger that the price earnings ratio is, the more we have to pay for every dollar earned. The larger the market to book value is, the more we have to pay for every dollar of equity we have written on a balance sheet. As stated before, the price earnings ratio was 22.02 (Financial Statements, n.d.). This demonstrates that Coca-Cola is expanding a lot quicker than their competition. Due to the market to book value being 6.61, Coca-Cola can have an idea of how advantageous they are, and whether or not they are using their assets wisely (Financial Statements, n.d.). Next, I will discuss Coca-Cola’s profitability...

Words: 977 - Pages: 4

Free Essay

Capella Unit 6 Discussion 2 Mba 6004

...Capella MBA 6004 Unit 6 Discussion 2 In the article "How David Beats Goliath” uncovers the secret to victory as an underdog. An underdog is someone who is seen to be less than or having an disadvantage. The secrete to overcoming a strong opponent is to combat the opponent with a non-traditional approach. If ones opponent is strong in a specific skill set, it is wise to craft at strategy the works against their weakness. In the article Vivek Ranadive coached a basketball team of average 12 year old girls who were not passionate about basketball. Through observation he noticed that a lot of their opponents were passionate basketball players who frequently played as pastime. He also noticed that most teams did not “full court press” for the majority of the game. He therefore coached his team to full court press in each game since they were not as skilled in other things like dripping, shooting etc. Consequently this team went all the way to the national championship. They became strong where the “better” teams were weak and rendered victory. This same principle can be used in everyday life as well as business. For example is Greg had a desire to be a music artist or rapper. He can assess the strengths of the best-selling artist and then fill in a gap their they are lacking. If someone else has the territory covered Greg can simply find his territory and this is what will make him thrive. I plan to apply this David defeats Goliath principle in my fashion company. Instead...

Words: 310 - Pages: 2

Premium Essay

Enron Bay

...|ENMU Ruidoso Branch Community College | |Course Syllabus | This course syllabus is required reading. Please make a copy of the syllabus and keep it handy for reference. |Course information: Adolescent Psychology; PSY 202 | | | |Semester: Fall I August 21-Oct. 12, 2012 |Year: 2012 | |Course #: PSY 202 |Title: Adolescent Psychology | |CRN #: 18858 |Credits: 3 | Instructor information: Dinah Hamilton, M.Ed. Dinah.Hamilton@enmu.edu 575-257-2120 X 385 Rationale for student taking this course: This course will meet the requirements for a Psychology course with General Core Education requirements...

Words: 3023 - Pages: 13

Free Essay

Thepoopnig

...Unit 3 Case Study 5454 unread replies.5454 replies. Bellow you will find a clinical case study.  The case study starts with a description of a patients’ medical history, followed by discussion question/s. First, you have to analyze the medical history of the patient.  As you read the patient’s information: * Highlight any risk factors that might exist, existing medical conditions, present signs and symptoms or complains that the patient is suffering from.  * Analyze the results of any diagnostic tests that were performed.  Diagnostic tests include, physical exams, blood test, radiologic tests (x-ray, CT scans, etc.), and other functional tests. * Relate the medical treatment used to the underlying pathology. * Propose clinical management plan for the patient’s condition, and possible prognosis. You are encouraged to discuss the cases with other students and in groups, however, each student should submit the analysis of the case study in their own words through discussions.  Students should submit their case study through the “Discussion” link AND the “Turnitin Dropbox” link for that case study available on the course’s main page.  If you fail to submit your case study through both links your case study will not be graded. Turnitin is an automated system which instructors can use to quickly and easily compare each student's assignment with billions of web sites, as well as an enormous database of student papers that grows with each submission.Accordingly, you...

Words: 1697 - Pages: 7

Free Essay

Res 111 Presentation Essentials Unit 1 Db Rhetorical Triangle

...RES 111 Presentation Essentials Unit 1 DB rhetorical_triangle Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser https://hwguiders.com/downloads/res-111-presentation-essentials-unit-1-db-rhetorical_triangle/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) Use the Internet, library, and unit resources to research each of the following four approaches for developing a presentation: a speech or lecture a workshop a discussion a group activity You are expected to do the following: Explain the reasons why or when you would use each of these approaches. Describe how the three attributes of the Rhetorical Triangle (speaker, audience, and situation) are utilized in each of the four approaches LAYOUT OF PAPER: Part 1: A speech or lecture - Begin this section of your paper by explaining how, why and/or when you would use a speech or lecture to develop a presentation. - Then you should explain how the three components of the Rhetorical Triangle (i.e., the speaker, the audience, and the situation) operate within the dynamics of a speech or lecture. Part 2: A workshop - Begin this section of your paper by explaining how, why and/or when you would use a workshop to develop a presentation. - Then you should explain how the three components of the Rhetorical...

Words: 3311 - Pages: 14

Premium Essay

Eng4Ua Assignment Breakdown

...Assignment Breakdown Unit 1 – 5% Activity 1 – Grammar Review Grammar Quiz – Formative Activity 2 – Academic Citation Citation Review – Formative Activity 3 – Plagiarism Dropbox: Katrina Letter - Formative Discussion: Case Studies – Formative Activity 4 – Essay Structure Dropbox: Reorganizing the Essay - (2.5%) Activity 5 – Statement of Intent and Initial List of Works Cited Dropbox: Statement of Intent and Initial List of Works Cited - Formative Activity 6 – Editing the Essay Discussion: Shakespeare Essay – Formative Dropbox: Literature Essay Rewrite (2.5%) Unit 2 – 15% Activity 1 – Imagery and Symbolism Discussion: Symbols and Images - Formative Dropbox: Poetic Verbal-Visual Collage (5%) Activity 2 – Diction Dropbox: Event Poem/Reflection - Formative Activity 3 – Form Discussion: Forms - Formative Activity 4 – Sound and Sense Dropbox: Poetry Analysis – Formative (5%) Activity 5 – Theme and Understanding Discussion: Battle of the Critics - Formative Activity 6 – ISP Reflective Journal Dropbox: Reflective Journal - Formative Activity 7 – Culminating Activity Dropbox: Best Poem in the World (5%) Discussion: Best Poem - Formative Unit 3 – 25% Activity 1 – Culminating Assignment Essay Module Discussion: Integrated Quotations - Formative Discussion: Elaboration of Evidence - Formative Activity 2 – Worldviews and Interpretations Dropbox: “The Return” Response (Parts A, B, and C) - Formative Activity 3 – Text Attack Discussion: The 5 ‘W’’s -...

Words: 441 - Pages: 2