Unix Security
Unix Security
Presenter Name
Presentation Date
u
u Integrity
u Availability
3ss s
u Oardware
u Network connection
u Data
u Services
al
ss s
u mser Error
u Oardware Failure
u Theft of Oardware
u Data Manipulation
u Theft of services
u Eavesdropping
u Viruses
m
s
Password Security
Password Discovery
2 Programs
ass
u The basic authentication method for host systems
involves username and Password .
ss
mID 0
oot Management options
2
Setting up sudo
3
s 3
sa
a
s
emove unneeded accounts
2
Patch, estrict or emove Programs
3
Disable mnneeded services
4
Monitor and estrict Access to services
5
Implement Built-
Built-in Firewalls
3
s
Steps to disable an account
u Make a backup of /etc/shadow and /etc/passwd files and ensure
them with permissions set to 700 and the files are owned by root.
These steps prevent the account from being logged into, because the
user will not have valid shell or password.
a
s
as
Steps to disable an account
u Make a backup of /etc/shadow and /etc/passwd files and ensure
them with permissions set to 700 and the files are owned by root.
These steps prevent the account from being logged into, because the
user will not have valid shell or password.
a
sabl s
s
Steps to disable an account
u Make a backup of /etc/shadow and /etc/passwd files and ensure
them with permissions set to 700 and the files are owned by root.
These steps prevent the account from being logged into, because the
user will not have valid shell or password.
l B
l
alls
u Modern mnix system include a built-in firewall for
restricting access to the system based on criteria set by
the system administrator.