100% found this document useful (1 vote)
159 views

01 Introduction To Linux Host Security

This document provides an introduction to Linux host security. It begins by outlining the objectives of understanding IT security, common security threats, basic security architecture models, and Linux mechanisms for host security. It then discusses why it is important to protect systems, defines security, and introduces security architecture and the ISO security services model. The document outlines implementing security policies and lists guidelines for goals and policies. It also discusses security threats, system mechanisms in Linux for security features like user administration and access control, and sources of ongoing security information like mailing lists and websites. The key topics covered are identification and authentication, access control and authorization, system integrity, auditing, and intrusion management on Linux systems.

Uploaded by

Simona Vintila
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
159 views

01 Introduction To Linux Host Security

This document provides an introduction to Linux host security. It begins by outlining the objectives of understanding IT security, common security threats, basic security architecture models, and Linux mechanisms for host security. It then discusses why it is important to protect systems, defines security, and introduces security architecture and the ISO security services model. The document outlines implementing security policies and lists guidelines for goals and policies. It also discusses security threats, system mechanisms in Linux for security features like user administration and access control, and sources of ongoing security information like mailing lists and websites. The key topics covered are identification and authentication, access control and authorization, system integrity, auditing, and intrusion management on Linux systems.

Uploaded by

Simona Vintila
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Introduction to Linux Host Security

Objectives
After completing this presentation, you should be able to: Define the importance of IT security Describe some common threats to IT security Define a basic security architecture model List common security services List Linux mechanisms for host security List general guidelines for security policies

Why Protect Systems?


"Our losses from terrorism could be as high as $50 million. Our biggest risk is losing our customers' trust; we'd have to be born again with a new name to recover." A commercial bank executive

Defining Security
Reduction of risk

Protection against threats

Introduction to Security Architecture

Security Model

ISO 7498-02 Security Services


Identification and authentication Access control Confidentiality Data integrity Non-repudiation Security management including audit

Security Management Cycle

Implementing a Security Policy


As a system security administrator or implementer you:

Must understand how to evaluate a statement of security requirements Have a primary responsibility in managing the organization Are required to:

Translate information used in creating the security policy Implement the policy to ensure fair treatment to every user Understand general guidelines for goals and policies

Security Threats and Business Risks

Other Security Threats

System Mechanisms (1 of 2)
Hardware User Group Password System resource management

System Mechanisms (2 of 2)
File management Log management Printing Backup and restore Auditing System monitoring Problem reporting Intrusion detection

Linux Mechanisms
Services and mechanisms covered in this course include: User administration Configuring access control Monitoring access control System file integrity (including devices and key management files) Delegation of authority (sudo) Accountability (auditing mechanisms)

Linux Security Details


User authentication Login process Login tracking Administrative roles with sudo Groups Access control lists File and directory permissions Security-related files Auditing

Staying Current with Security


New security issues are discovered daily. If you do not stay up-to-date with security you will be vulnerable. What you don't know can hurt you and your organization. There are many security communities for both discussion and information on topics ranging from Linux-specific security to more general UNIX security to OS independent security topics. Mailing lists tend to be best for active discussion. Web sites are better for documentation and information. Know your vulnerabilities; those who would want to compromise your system certainly will. Constant education is simply part of the job of maintaining an effective security policy.

Linux Security Web Sites


http://www.cert.org/ http://www.securityfocus.com/ http://www.linuxsecurity.com/ http://lsap.org/ http://www.faqs.org/faqs/computer-security/

Linux Security Mailing Lists


http://online.securityfocus.com/archive http://www.redhat.com/mailing-lists/linuxsecurity/ http://www.suse.com/us/support/mailinglists/ http://lists.insecure.org/ http://www.linuxsecurity.com/general/mailing lists.html

Other Sources of Information


USENET newsgroups:

comp.os.linux.security comp.os.unix.security http://www.linux.org/groups/ http://www.redhat.com/apps/community/LUG/ http://lugww.counter.li.org/

Local Linux user group directories


What You Will Learn


Among the various mechanisms and facilities provided by Linux, we will cover the following topics: Installing Linux Identification and Authentication Access Control and Authorization Availability System Integrity Auditing Intrusion Management Application Security

What Comes Next?


TCP/IP network security Network services:

Secure shell and secure copy Socks proxy Standard proxies DNS E-mail VPN

Firewalls Network address translation

Checkpoint
1. What are some of the possible losses due to a compromised system? 2. What are the five main steps in the security management cycle? 3. What would you use to allow a trusted user to perform some specific system maintenance on a regular basis, instead of giving out the root password? 4. What are some of the possible threats to system security? 5. Once intruders have infiltrated a system, they may install a program that allows them to gain root privileges in a system.What is this type of program called?

Unit Summary
Having completed this unit, you should understand: The importance of security to your organization The types of threats to look out for Some basic security concepts and ideas The major security features of Linux

You might also like