CS 480-M01 Linux System Administration - CRN 60315 - Fall 2022
[Home]     [Syllabus]     [Notes]     [Grades]

CS 480 Lec 20 Fall 2022

CS 480 M01 Lecture Notes 20 - Nov 14, 2022

Last Time: Ch 27. Security Basics Intro

27. Security Basics Continued

Intro Continued

Elements of Security

CIA triad:

How security is compromised

Basic Security Measures

Most systems do not come secure out of the box - Admins should harden new systems
Rules of thumb

Measures
  1. Software Updates / Patches - install asap (local repositories + regular schedule)
        rsync -rlptH rsync.opensuse.org::opensuse-updates . --delete-after --delete-excluded -hi --stats;
    plus watch /sign for vendor specific security mailing lists and general security forums: US CERT ( bulletins , ...)
    Schneier on Security
  2. Unnecessary services turned off
    To find them ...
    old: new:
  3. Remote event logging - syslog messages sent to a secure host as a central logging machine
    easier to write monitoring scripts, harder for a hacker to cover up
  4. Backups (“availability” bucket of the CIA triad) - uncontaminated checkpoint from which to restore BUT Can be a security risk too!
  5. Viruses and Worms - UNIX/Linux mostly immune (market share, access-controlled environment / don't use root for day to day activities)
  6. Trojans (watch security advisories, mailing lists, be careful where you get your sw from)
  7. Rootkits - programs and patches that hide important system information such as process, disk, or network activity
    replace applications (ls, ps, find, netstat, ...), libraries, kernel modules, ...
    hard to detect (OSSEC, tripwire, ...) and clean up
  8. Packet Filtering - use firewall, iptables with SuSEfirewall2 or since 15.0 newer firewalld / firewall-cmd,.. - at your network perimeter and at the individual systems
    should pass only specifically allowed traffic
  9. Passwords - selection + not allow clear text to get on network (ssh,..) and MFA: Multifactor Authentication (knows / has / is )
  10. Vigilance - monitor system, network, processes, changes, ... frequently
  11. Application penetration testing ("Security is only as strong as the weakest link in the chain.")
  12. Encryption
  13. General philosophy - common sense:

Next: Passwords and User Accounts