Cybersecurity Essentials 3.0-Module08
Cybersecurity Essentials 3.0-Module08
Explain why Linux skills are essential for network security monitoring
Linux Basics
and investigation.
Working in the Linux Shell Use the Linux shell to manipulate text files.
Use the Linux command line to identity servers that are running on a
Linux Servers and Clients
computer.
Basic Server
Use commands to locate and monitor log files.
Administration
The Linux File System Use commands to manage the Linux file system and permissions.
Working in the Linux GUI Explain the basic components of the Linux GUI.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Linux Basics
What is Linux?
• Linux is an operating system created in 1991 that is open source, fast, reliable, and
small.
• It requires very little hardware resources to run and is highly customizable.
• Unlike Windows and Mac OS X, it was created and currently maintained by a
community of programmers.
• It is designed to be connected to the network, which makes it much simpler to write
and use network-based applications.
• Any person or company can get the kernel’s source code, inspect it, modify it, and
re-compile it at will.
• They are also allowed to redistribute the program with or without charges.
• Linux distribution (distro) is the term used to describe packages created by
different organizations and includes the Linux kernel with customized tools and
software packages.
• Examples of distros include: Debian, Red Hat, Ubuntu, CentOS, and SUSE.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Linux Basics
The Value of Linux
Linux is often the operating system of choice in the Security Operations Center (SOC). Some of the
reasons to choose Linux:
• Linux is open source - Anyone can acquire Linux at no charge and modify it to fit specific needs.
• The Linux CLI is very powerful - GUI makes many tasks easier to perform but adds complexity
and requires more computer resources to run. CLI enables analysts to perform tasks directly on a
terminal and remotely.
• The user has more control over the OS - The administrator user in Linux (root user or superuser)
has absolute power over the computer. The root user can modify any aspect of the computer with
a few keystrokes.
• It allows for better network communication control - Because the OS can be adjusted in practically
every aspect, it is a great platform for creating network applications.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Linux Basics
Linux in the SOC
•The entire operating system can be tailored to become the perfect security analysis platform.
•Administrators can add only the necessary packages to the OS, making it lean and efficient.
• Specific software tools can be installed and configured to work in conjunction, allowing
administrators to build a customized computer that fits perfectly in the workflow of a SOC.
• The figure shows Sguil, which is the cybersecurity analyst console in a special version of Linux
called Security Onion.
•Security Onion is an open-source suite of tools that work together for network security analysis.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Linux Basics
Linux in the SOC (Cont.)
Tools that are often found in a SOC are:
Tool Explanation
Network packet capture This is a crucial tool to observe and understand every detail of a network
software transaction. Wireshark is a popular packet capture tool.
They allow analysts to safely run and observe malware execution without the risk of
Malware analysis tools
compromising the underlying system.
They are used for real-time traffic monitoring and inspection. If any aspect of the
Intrusion detection systems
currently flowing traffic matches any of the established rules, a pre-defined action is
(IDSs)
taken.
This software is used to specify, based on pre-defined rules, whether traffic is allowed
Firewalls
to enter or leave a network or device.
Because a network can generate a very large number of log entries, log manager
Log managers
software is employed to facilitate log monitoring.
Security information and event SIEMs provide real-time analysis of alerts and log entries generated by network
management (SIEM) appliances such as IDSs and firewalls.
Task ticket assignment, editing, and recording is done through a ticket management
Ticketing systems
system.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Linux Basics
Linux Tools
• In addition to SOC-specific tools, Linux computers that are used in the SOC often contain
penetration testing tools.
• A penetration test (PenTesting) is the process of looking for vulnerabilities in a network or
computer by attacking it.
•Packet generators, port scanners, and proof-of-concept exploits are examples of PenTesting tools.
• Kali Linux is a Linux distribution that groups many penetration tools together in a single Linux
distribution. It contains a great selection of tools.
•The figure shows a screenshot of Kali Linux.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
8.2 Working in the Linux Shell
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Working in the Linux Shell
The Linux Shell
• In Linux, the user communicates with the OS by using the CLI or the GUI (default).
• This hides the CLI from the user. One way to access the CLI from the GUI is through a terminal
emulator application. These applications provide user access to the CLI.
• In Linux, popular terminal emulators are Terminator, eterm, xterm, konsole, and gnome-terminal.
• The figure shows gnome-terminal, a popular Linux terminal emulator.
• The terms shell, console, console window, CLI terminal, and terminal window are often used
interchangeably.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Working in the Linux Shell
Basic Commands
Linux commands are programs stored on the disk created to perform a specific task. When a user types
a command, the shell must find it on the disk before it can be executed.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Working in the Linux Shell
Basic Commands (Cont.)
Command Description
grep Used to search for specific strings of characters within a file or other command
outputs.
Used to display or configure network card related information. If issued without
ifconfig
parameters, ifconfig will display the current network card(s) configuration.
apt-get Used to install, configure, and remove packages on Debian and its derivatives.
iwconfig Used to display or configure wireless network card related information.
Used to shut down the system, shutdown can be instructed to perform a number
shutdown
of shut-down-related tasks.
passwd Used to change the password.
cat Used to list the contents of a file and expects the file name as the parameter.
man Used to display the documentation for a specific command.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Working in the Linux Shell
File and Directory Commands
Many command line tools are included in Linux by default.
The table lists a few of the most common commands related to files and directories.
Command Description
Is Displays the files inside a directory
cd Changes the current directory
mkdir Creates a directory under the current directory
cp Copies files from source to destination
mv Moves or renames files and directories
rm Removes files
grep Searches for specific strings of characters within a file or other commands
outputs
cat Lists the contents of a file and expects the file name as the parameter
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Working in the Linux Shell
Working with Text Files
• Linux has many different text editors, with various features and functions. Some text editors
include graphical interfaces while others are command-line only tools.
• Each text editor includes a feature set designed to support a specific type of task.
• Some text editors focus on the programmer and include features such as syntax highlighting,
brackets and parenthesis check, and other programming-focused features.
• While graphical text editors are convenient and easy to use, command line-based text editors are
very important for Linux users.
• The main benefit of command-line-based text editors is that they allow for text file editing from a
remote computer.
• Consider the following scenario: a user must perform administrative tasks on a Linux computer
but is not sitting in front of it. Using SSH, the user starts a remote shell to the remote computer
and launches a text-based tool to perform the tasks.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Working in the Linux Shell
The Importance of Text Files in Linux
• In Linux, everything is treated as a file (memory, the disks, the
monitor, and the directories).
• Practically everything in Linux relies on configuration files to
work. Some services have not one, but several configuration
files.
• Users with proper permission levels can use text editors to
change the contents of configuration files.
• After the changes are made, the file is saved and can be used by
the related service or application.
• In the figure, the administrator opened the host configuration file
in nano for editing with the sudo nano /etc/hosts command.
• The superuser or a user with the superuser privilege can change
the host file.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Working in the Linux Shell
Lab – Working with Text Files in the CLI
In this lab, you will become familiar with Linux command line text editors and configuration files, and
you complete the following objectives:
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Working in the Linux Shell
Lab – Getting Familiar with the Linux Shell
In this lab, you will use the Linux command line to manage files and folders and perform some basic
administrative tasks:
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
8.3 Linux Servers and Clients
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Linux Servers and Clients
An Introduction to Client-Server Communications
• Servers are computers with software installed that enables them to provide services to clients
across the network.
• Some services provide external resources (files, email messages, web pages) to clients and
others run maintenance tasks (log management, memory management, disk scanning).
• Each service requires separate server software. For example, the server in the figure uses file
server software to provide clients with the ability to retrieve and submit files.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Linux Servers and Clients
Servers, Services, and Their Ports
• In order that a computer can be the server for multiple services, ports are used.
• A port is a reserved network resource used by a service. A service is said to be “listening” on a port
when it has associated itself to that port.
• While the administrator can decide which port to use with any given service, many clients are
configured to use a specific port by default.
• It is common practice to leave the service running in its default port.
The table lists a few commonly used ports (“well-known ports”) and their services.
Port Description
20/21 File Transfer Protocol (FTP)
22 Secure Shell (SSH)
23 Telnet remote login service
25 Simple Mail Transfer Protocol (SMTP)
53 Domain Name System (DNS)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Linux Servers and Clients
Servers, Services, and Their Ports (Cont.)
Port Description
67/68 Dynamic Host Configuration Protocol (DHCP)
69 Trivial File Transfer Protocol (TFTP)
80 Hypertext Transfer Protocol (HTTP)
110 Post Office Protocol version 3 (POP3)
123 Network Time Protocol (NTP)
143 Internet Message Access Protocol (IMAP)
161/162 Simple Network Management Protocol (SNMP)
443 HTTP Secure (HTTPS)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Linux Servers and Clients
Clients
• Clients are programs or applications designed to communicate with a specific type of service.
• Clients (client applications) use a well-defined protocol to communicate with the server.
• Web browsers are web clients that are used to communicate with web servers through HTTP on
port 80.
• The FTP client is software used to communicate with an FTP server.
• The figure shows a client uploading files to a server.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Linux Servers and Clients
Lab Video - Use a Port Scanner to Detect Open Ports
In this video, the use of a port scanner and network mapping tool, Nmap, to detect open ports is
discussed and demonstrated:
• Step 1: Open a terminal window in the CSE-LABVM (PC with the CSE-LABVM installed in
VirtualBox).
• Step 2: Run Nmap.
• Step 3: Use administrative privileges with Nmap.
• Step 4: Capture SSH keys.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Linux Servers and Clients
Lab - Use a Port Scanner to Detect Open Ports
In this lab, you will use Nmap, a port scanner and network mapping tool, to detect open ports.
• Step 1: Open a terminal window in the CSE-LABVM (PC with the CSE-LABVM installed
in VirtualBox).
• Step 2: Run Nmap.
• Step 3: Use administrative privileges with Nmap.
• Step 4: Capture SSH keys.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Linux Servers and Clients
Lab - Linux Servers
In this lab, you will use the Linux command line to identify servers running on a given computer.
• Part 1: Servers
• Part 2: Using Telnet to Test TCP Services
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
8.4 Basic Server
Administration
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Basic Server Administration
Service Configuration Files
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Basic Server Administration
Hardening Devices
• Device hardening involves implementing proven methods of securing the device and protecting its
administrative access.
• Defining administrative roles in terms of access is another important aspect of securing
infrastructure devices.
• OS updates are also extremely important to maintaining a hardened device. New vulnerabilities
are discovered every day. OS developers create and issue fixes and patches regularly.
• Some logs contain information about daemons that are running in the Linux system.
• A daemon is a background process that runs without the need for user interaction.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Basic Server Administration
Monitoring Service Logs (Cont.)
The table lists a few popular Linux log files and their functions.
Linux Log File Description
This directory contains generic computer activity logs. It is mainly used to store informational and non-
/var/log/messages critical system messages.
This file stores all authentication-related events in Debian and Ubuntu computers. Anything involving
/var/log/auth.log the user authorization mechanism can be found in this file.
This directory is used by RedHat and CentOS computers instead of /var/log/auth.log. It also tracks
/var/log/secure sudo logins, SSH logins, and other errors logged by SSSD.
This file stores boot-related information and messages logged during the computer startup process.
/var/log/boot.log
This directory contains kernel ring buffer messages. Information related to hardware devices and their
/var/log/dmesg drivers is recorded here.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Basic Server Administration
Monitoring Service Logs (Cont.)
The table lists a few more popular Linux log files and their functions.
/var/log/mysqld.log or This is the MySQL log file. All debug, failure, and success messages related to the mysqld process
/var/log/mysql.log and mysqld_safe daemon are logged here.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Basic Server Administration
Lab – Locating Log Files
In this lab, you will get familiar with locating and manipulating Linux log files.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
8.5 The Linux File System
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
The Linux File System
The File System Types in Linux
Linux File System Description
ext2 (second extended file system) It was the default file system in several major Linux distributions until supplanted by
ext3.
ext3 (third extended file system) It is a journaled file system designed to improve the existing ext2 file system.
Designed as a successor of ext3, it was created based on a series of extensions to
ext4 (fourth extended file system) ext3, but the ext3 project was split in two; one kept as ext3 (normal development) and
other, ext4 (the mentioned extensions).
NFS (Network File System) NFS is a network-based file system, allowing file access over the network.
CDFS (Compact Disc File System) CDFS was created specifically for optical disk media.
Swap File System The swap file system is used by Linux when it runs out of RAM.
HFS Plus or HFS+ (Hierarchical File A file system used by Apple in its Macintosh computers. The Linux kernel includes a
System Plus) module for mounting HFS+ for read-write operations.
APFS (Apple File System) An updated file system that is used by Apple devices.
Located in the first sector of a partitioned computer, it stores all the information about
Master Boot Record (MBR)
the way in which the file system is organized.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
The Linux File System
The File System Types in Linux (Cont.)
• Mounting is the term used for the process of assigning a directory to a partition.
• After a successful mount operation, the file system contained on the partition is accessible
through the specified directory.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
The Linux File System
Linux Roles and File Permissions
Field Description
It displays the permissions associated with the file. The dash (-) means that this is a file. For directories, the first dash
would be a “d”. The first set of characters is for user permission (rwx ) who owns the file. The user (analyst)
can Read, Write, and eXecute the file. The second set of characters is for group permissions (rw-) who owns the file.
1 The group (staff) can Read and Write to the file. The third set of characters is for any other user or group permissions
(r--). They can only Read the file.
2 It defines the number of hard links to the file (the number 1 after the permissions).
File permissions are a fundamental part of Linux and cannot be broken. A user has only the rights to a file that
the file permissions allow. The only user that can override file permission on a Linux computer is the root user.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
The Linux File System
Hard Links and Symbolic Links
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
The Linux File System
Hard Links and Symbolic Links (Cont.)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
The Linux File System
Lab - Navigating the Linux Filesystem and Permission Settings
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
8.6 Working with the Linux GUI
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Working with the Linux GUI
X Window System
• The graphical interface present in most Linux computers (X or X11)
is based on the X Window System.
• X Window is designed to provide the basic framework for a GUI.
• It includes functions for drawing and moving windows on the
display device and interacting with a mouse and keyboard.
• X works as a server which allows a remote user to use the network
to connect, start a graphical application, and have the graphical
window open on the remote terminal.
• While the application itself runs on the server, the graphical aspect
of it is sent by X over the network and displayed on the remote
computer.
• X does not specify the user interface, leaving it to other programs,
such as window managers, to define all the graphical components.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Working with the Linux GUI
The Linux GUI
• GUIs are considered more user-friendly than the CLI. This module focuses on Ubuntu when covering
Linux because it is a very popular and user-friendly distribution.
• Ubuntu Linux uses Gnome 3 as its default GUI. The goal of Gnome 3 is to make Ubuntu even more user-
friendly. The table lists the main UI components of Unity.
UI Component Description
It shows icons for the apps that are installed on the system. A right-click menu provides shortcuts
Apps Menu that allow starting or configuring the apps.
This is a dock on the left side of the screen that serves as an application launcher and switcher for
Ubuntu Dock app favorites. Click to launch an application and when the application is running, click again to
switch between running applications.
This multipurpose menu bar contains a menu for the application that currently has the focus. It
Top Bar displays the current time and indicates whether there are new system messages.
Calendar and System Click the day and time to see the full appointment calendar and any current system messages.
Message Tray Access the appointment calendar from here to create new appointments.
Activities Switch to application view to switch to or close running applications.
Status Menu Allows configuration of the network adaptor and other running devices.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
8.7 Working on a Linux Host
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Working on a Linux Host
Installing and Running Applications on a Linux Host
• Many end-user applications are complex programs written in compiled languages. To aid in the
installation process, Linux often includes programs called package managers.
• A package is the term used to refer to a program and all its supporting files. By using a package
manager to install a package, all the necessary files are placed in the correct file system location.
• Package managers vary depending on Linux distributions. Pacman is used by Arch Linux
while dpkg (Debian package) and apt (Advanced Packaging Tool) are used in Debian and Ubuntu
Linux distributions.
• The apt-get update command is used to get the package list from the package repository and
update the local package database.
• The apt-get upgrade command is used to update all currently installed packages to their latest
versions.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Working on a Linux Host
Keeping the System Up to Date
• Also known as patches, OS updates are released periodically by OS companies to address any
known vulnerabilities in their operating systems.
• While companies have update schedules, the release of unscheduled OS updates can happen when a
major vulnerability is found in the OS code.
• Modern operating systems will alert the user when updates are available for download and installation, but
the user can check for updates at any time.
• The table compares Arch Linux and Debian / Ubuntu Linux distribution commands to perform package
system basic operations.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Working on a Linux Host
Keeping the System Up to Date (Cont.)
• A Linux GUI can also be used to manually check and install updates.
• In Ubuntu for example, to install updates you would click Dash Search Box, type software updater, and
then click the Software Updater icon, as shown in the figure.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Working on a Linux Host
Processes and Forks
• Multitasking operating systems can execute many processes at the same time.
• Processes need a way to create new processes in multitasking operating systems. The fork operation is the
only way of doing so in Linux.
• When a process calls a fork, the caller process becomes the parent process, with the newly created process
referred to as its child.
• After the fork, the processes are, to some extent, independent processes; they have different process IDs but
run the same program code. The table lists three commands that are used to manage processes.
Command Description
Used to list the processes running on the computer at the time it is invoked. It can be instructed
ps to display running processes that belong to the current user or other users.
Used to list running processes, but unlike ps, top keeps displaying running processes
top dynamically. Press q to exit top.
Used to modify the behavior of a specific process. Depending on the parameters, kill will remove,
kill restart, or pause a process.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Working on a Linux Host
Malware on a Linux Host
• Linux malware includes viruses, Trojan horses, worms, and other types of malware that can affect
the operating system.
• Due to some design components such as file system structure, file permissions, and user account
restrictions, Linux operating systems are generally regarded as better protected against malware.
• Linux is not immune to malware. Many vulnerabilities have been found and exploited in Linux.
• Because Linux is open source, fixes and patches are often made available within hours of the
discovery of such problems.
• If a malicious program is executed, it will cause damage, regardless of the platform. A common
Linux attack vector is its services and processes.
• As with most vulnerabilities, keeping the computer updated and closing any unused services and
ports is a good way to reduce the opportunities for attack in a Linux computer.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Working on a Linux Host
Rootkit Check
• A rootkit is a type of malware that is designed to increase an unauthorized user’s privileges or
grant access to portions of the software that should not normally be allowed.
• Its installation can be automated (done as part of an infection) or manually.
• It changes kernel code and its modules, changing the most fundamental operations of the OS
itself.
• Most of the rootkit compromises require root or administrator access.
• Because the very nature of the computer is compromised, rootkit detection can be very difficult.
• Inspection methods include behavioral-based methods, signature scanning, difference scanning,
and memory dump analysis.
• Rootkit removal can be complicated and often impossible, especially in cases where the rootkit
resides in the kernel; re-installation of the operating system is usually the only real solution.
• Firmware rootkits usually require hardware replacement.
• chkrootkit is a popular Linux-based program designed to check the computer for known rootkits.
• While helpful, keep in mind that programs to check for rootkits are not 100% reliable.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Working on a Linux Host
Piping Commands
• Many commands can be combined to perform more complex tasks by a technique known as
piping.
• Piping consists of chaining commands together, feeding the output of one command into the input
of another using the character "|" (pipe).
• For example, the ls command is used to display all the files and directories of a given directory.
The grep command compares searches through a file or text looking for the specified string.
• The two commands, ls and grep, can be piped together to filter out the output of ls. This is shown
in the output of the ls -l | grep host command and the ls -l | grep file command.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Working on a Linux Host
Video - Applications, Rootkits, and Piping Commands
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Working on a Linux Host
Lab - Configure Security Features in Windows and Linux
In this lab, you will create restore points and backups for use in Windows and Linux systems.
Furthermore, you will configure Windows Defender Firewall to allow desired traffic. In a Linux system,
you will configure the Uncomplicated Firewall (UFW) to block unsecure Telnet traffic. You will also
disable Telnet services.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
8.8 Linux Basics Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Linux Basics Summary
What Did I Learn in this Module?
• Linux is an open-source operating system that is fast, powerful, and highly customizable.
• It was created and is currently maintained by a community of programmers.
• It is designed to be connected to the network, which makes it much simpler to write and use
network-based applications.
• A Linux distribution (distro) describes packages created by different organizations. It includes
the Linux kernel with customized tools and software packages.
• The flexibility provided by Linux is a great feature for the SOC. The entire operating system
can be tailored to become the perfect security analysis platform.
• In Linux, the user communicates with the OS by using the CLI or the GUI (default).
• Many commands line tools are included in Linux by default. To adjust the command operation,
user can pass parameters and switches along with the command.
• Linux has many different text editors, with various features and functions.
• In Linux, everything is treated as a file (memory, disks, monitor, and the directories).
• In Linux, services are managed using configuration files. When the service starts, it looks for
its configuration files, loads them into memory, and adjust itself according to the settings in the
files.
• Log files are the records that a computer stores to keep track of important events. In Linux,
log files can be categorized as application logs, event logs, service logs, and system logs.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65