Projectproposal
Projectproposal
By:
Iago Castro Cuna, 000628811
Supervised by:
Kanti Chhabhadiya
1.1 Introduction
At present the number of Linux servers in the IT world is rapidly increasing. This is
mainly due to security and reliability reasons by being a very safe and powerful
operative system. However, there are vulnerabilities that can affect any Unix-based
system. My aim in this project will be to explore and identify the most common
security issues in a Linux Server along with the possible solutions.
In a first stage I will be implement a Local Network with a Linux Server and two
workstations. Once the Network is tested and running, the server will be configured
with the following services; Email server, Web server, SFTP, MySQL and SSH.
In order to check the vulnerability of the Linux Server, in the second stage I will
perform a set of hacking techniques divided in two sections:
Local Network Hacking (Attacking the server from inside the Local Network)
External Hacking (Attacking the server from outside the Local Network)
During these processes, a video will be recorded to illustrate the hacking techniques
performed.
1.2 Background/Problem
By its nature, Linux is considered to be a very solid operative system due to the fact
that integrates common features of Unix, in terms of security. Despite of that, the
Linux administrator plays a key role in any security related concerns, therefore it is
really important to research and investigate constantly threads that affect any Network
and particularly the Servers.
Secure a Linux Server is a highly specialized task that must be carried out carefully
and with precision. It also requires great knowledge of the subject matter, in order to
achieve a high level of success. This project will be supported by Advanced Linux
Users and will make constant references to the Linux Community.
Through a careful configuration the chances to compromise the security from hacking
attacks can be reduced to the minimum. This is where the project will have more
emphasis. The final report and investigation will be aimed at those Linux users, who
want to strengthen the security of their servers.
2 Feasibility Study
2.1 Abstract
Every proposal or idea has its limitations, in order to prevent the main constraints that
can compromise the success of the project, a feasible study has been made, in this
particular case the study is divided in the following sections.
2.2.1 Technical Feasibility
Figure 1
Regarding to the Linux server installation, the biggest risks would be the
misconfiguration of the services previously mentioned, Web server, Email
server, SFTP, MySQL or SSH and the drop of these services. Fortunately
Linux is an open source operative system with a big community on internet
willing to help and a lot of resources to solve any issue. Also in order to avoid
the drop of the services a monitoring tool will be implemented.
It could be said that the technological risks of this research are minimal due to
the worldwide support and resources oriented to the Linux Operative System.
It is very important to define clearly the different stages of the project and write in
detail all the configurations made to avoid confusions and misleading instructions. To
achieve satisfactory results, the following steps will be implemented:
By following the instructions above, the risks will be minimized and the probabilities
of achieving a high quality work will be guaranteed.
It is worth highlighting that the objective of the whole projects in the Linux
Community to reinforce the security of the servers and reduce the impact of the
hacking attacks.
3 Conclusion