SlideShare a Scribd company logo
Operating System & Server Security
Presented by
Mohammad Ashfaqur Rahman
Compliance Professional
www.linkedin.com/in/ashfaqsaphal
ashfaq.saphal@gmail.com
Objective
●
Concept of OS security
●
Possible attack on Operating System
●
Hardening Example
●
HW security
OS Security
●
Key functions of an operating
system:
– Computer resource
management
– Provides a user interface
– Runs software utilities and
programs
– Enforce security measures
– Schedules jobs
OS Security
OS Security
●
In-build features
– Authorization and Authentication
– Resource Management
– Response to remote process
Attack !
●
Possible attack and known vulnerability
– Authentication over the network
• Password crack
• Anonymous / Guest login
– Restart / Shutdown machine
– Rootkit placement
– Access to resource
• Activate / deactivate HW component
• Identity theft
Example : User Management
●
80%++ incident are due to insufficient control on user
●
Best practice for user management
– Password policy
• Complexity
• Trivial password management
• Aging
– Account / login locking
• Too many authentication failure
• Rename administrator account (windows)
• Disable guest / nobody etc account
– User group policy
– Minimal file permission
Example : Window
Control Panel → Administrative Tools →
Local Security Setting → Local Policies
→ Security Options
●
Allow CD-ROM / Floppy Access to → localy
autheticated user only
●
Allow to format and Eject Removable
Media to → Administrator only
●
Require strong (windows 2000 or later)
session key
●
Restrict anonymous access to Named Pipes
and shares
●
Disable automatic execution of the
system debugger
●
Disable autoplay for new users by
default
●
Disable Dial-in access to other Server
Example : Window
Control Panel → Administrative Tools →
Services
●
FTP publishing service → Disable
●
Telnet Service → Disable
●
TFTP Service → Disable
●
SMTP → Disable
●
SNMP → Disable
●
SNMP → Disable
// In short disable the services which are
not required
Example : Linux
●
Disable USB
●
rm /lib/modules/2.6.18-
308.24.1.el5/kernel/drivers/usb/sto
rage/usb-storage.ko
●
Password / User data file permission
●
chown root:root passwd shadow group
gshadow
●
chmod 644 passwd group
●
chown root:root passwd shadow group
gshadow
Example : Linux
●
Set Permission to file system file
●
chown root:root /etc/fstab
●
chmod 0644 /etc/fstab
●
Set Umask
●
/etc/sysconfig/init
●
/etc/profile
●
/etc/csh.login
●
/etc/csh.cshrc
●
/etc/bashrc
Example : Linux
●
Set permission of Log files
●
for file in `cat /etc/syslog.conf
| grep -v # | grep var | awk
{'print $2'}`; do chmod 600
$file*;chown root:root $file*; done
●
Restrict remote login of root user
●
/etc/ssh/sshd_config
Example : Linux
●
Disable services that are not required
●
for FILE in chargen chargenudp
cups-lpd cups daytime daytime-udp
echo echo-udp eklogin finger gssftp
imap imaps ipop2 ipop3 krb5-telnet
telnet klogin kshell ktalk ntalk
pop3s rexec rlogin rsh rsync
servers services sgi_fam shell talk
telnet tftp time time-udp vsftpd
wuftpd
●
do
●
chkconfig ${FILE} off
●
done
Example : Linux
●
Enforce password policy
●
/etc/login.def
●
PASS_MAX_DAYS 45
●
PASS_MIN_LEN 8
●
PASS_MIN_DAYS 1
●
Enable password for boot loader (using
/sbin/grub-md5-crypt)
●
/etc/grub.conf
●
password --md5
●
Implement SUDO
●
/etc/sudoers
Example : Linux
●
Set authentication for single user mode
●
/etc/inittab
●
~~:S:wait:/sbin/sulogin
●
Restrict root access by “su”
●
grep ^wheel /etc/group
●
No member should be in “wheel”
group
Hardware Security
●
OS and Physical Security both are required
– OS should prevent malicious code execution
– Physical environment should ensure
• Managing temperature
• Physical Access Control
• Humidity Control
Hardware Security
●
Secure Deployment of hypervisor
– Patching
– Updated Software
●
Updated Firmware
●
Remove default username password
●
Create personal user for administration
●
Enable secure SNMP
●
Disable SNMP Trap
Let's Discuss

More Related Content

Viewers also liked (20)

PPTX
Dfc2043 operating system; open & closed source systems
FlameDimension95
 
PPT
Database & Data Security
Cloudbells.com
 
PPT
Social Roles, Technology & Privacy
Mathias Klang
 
PPT
Regulation by Facebook
Mathias Klang
 
PDF
Pruebas de Intrusión utilizando Open Source
Ing. Juan Pablo Quiñe Paz, CISSP-ISSMP
 
ODP
Cissp Week 24
jemtallon
 
PDF
CISSP - TELECOM apresentada no CNASI 2013
Adilson Da Rocha
 
PPTX
Apresentando o Windows Server 2008 R2
Rodrigo Immaginario
 
PPTX
CISSP week 26
jemtallon
 
PPT
FOSS & Society
Mathias Klang
 
PDF
DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...
Cláudio Dodt
 
ODP
CISSP Week 22
jemtallon
 
PPTX
Operating Systems A-Z
RavinJ
 
PPT
Owasp presentacion latam tour (Ago 2011)
Ing. Juan Pablo Quiñe Paz, CISSP-ISSMP
 
PDF
Owasp Top10 FireFox
Alejandro Ramos
 
DOCX
My first Operating System Presentation
Rida Bilgrami
 
PDF
CISSP Week 7
jemtallon
 
PPT
Open Source Operating System [Chapter 1]
Zulhilmi Shaffe
 
PPT
Top 5 Server Operating Systems
Sinbad Konick
 
PDF
Slide Deck CISSP Class Session 4
FRSecure
 
Dfc2043 operating system; open & closed source systems
FlameDimension95
 
Database & Data Security
Cloudbells.com
 
Social Roles, Technology & Privacy
Mathias Klang
 
Regulation by Facebook
Mathias Klang
 
Pruebas de Intrusión utilizando Open Source
Ing. Juan Pablo Quiñe Paz, CISSP-ISSMP
 
Cissp Week 24
jemtallon
 
CISSP - TELECOM apresentada no CNASI 2013
Adilson Da Rocha
 
Apresentando o Windows Server 2008 R2
Rodrigo Immaginario
 
CISSP week 26
jemtallon
 
FOSS & Society
Mathias Klang
 
DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...
Cláudio Dodt
 
CISSP Week 22
jemtallon
 
Operating Systems A-Z
RavinJ
 
Owasp presentacion latam tour (Ago 2011)
Ing. Juan Pablo Quiñe Paz, CISSP-ISSMP
 
Owasp Top10 FireFox
Alejandro Ramos
 
My first Operating System Presentation
Rida Bilgrami
 
CISSP Week 7
jemtallon
 
Open Source Operating System [Chapter 1]
Zulhilmi Shaffe
 
Top 5 Server Operating Systems
Sinbad Konick
 
Slide Deck CISSP Class Session 4
FRSecure
 

Similar to 006.itsecurity bcp v1 (20)

PDF
Using filesystem capabilities with rsync
Hazel Smith
 
PDF
Linux security quick reference guide
Craig Cannon
 
PDF
An Introduction To Linux
Ishan A B Ambanwela
 
PPTX
Resource Monitoring and management
Duressa Teshome
 
PPTX
Linux+Command+Line+&+Shell+Scripting+Masterclass+-+Final.pptx
newscribduserly
 
PDF
7 unixsecurity
richarddxd
 
PPTX
[OWASP Poland Day] Application security - daily questions & answers
OWASP
 
PDF
Adhocr T-dose 2012
Gratien D'haese
 
PPT
Download It
webhostingguy
 
ODP
Drupal Security Hardening
Gerald Villorente
 
ODP
Drupal Security Hardening
Gerald Villorente
 
PDF
Linux Hardening - Made Easy
Guy Barnhart-Magen
 
PPT
Syslog.ppt
ifsharahmad
 
PDF
We shall play a game....
Sadia Textile
 
PPTX
10 Tips for AIX Security
HelpSystems
 
KEY
No locked doors, no windows barred: hacking OpenAM infrastructure
Andrew Petukhov
 
ODP
Turbo charge your logs
Jeremy Cook
 
PDF
User Management and Privileges - pfSense Hangout February 2015
Netgate
 
PDF
Shall we play a game?
IngridRivera36
 
Using filesystem capabilities with rsync
Hazel Smith
 
Linux security quick reference guide
Craig Cannon
 
An Introduction To Linux
Ishan A B Ambanwela
 
Resource Monitoring and management
Duressa Teshome
 
Linux+Command+Line+&+Shell+Scripting+Masterclass+-+Final.pptx
newscribduserly
 
7 unixsecurity
richarddxd
 
[OWASP Poland Day] Application security - daily questions & answers
OWASP
 
Adhocr T-dose 2012
Gratien D'haese
 
Download It
webhostingguy
 
Drupal Security Hardening
Gerald Villorente
 
Drupal Security Hardening
Gerald Villorente
 
Linux Hardening - Made Easy
Guy Barnhart-Magen
 
Syslog.ppt
ifsharahmad
 
We shall play a game....
Sadia Textile
 
10 Tips for AIX Security
HelpSystems
 
No locked doors, no windows barred: hacking OpenAM infrastructure
Andrew Petukhov
 
Turbo charge your logs
Jeremy Cook
 
User Management and Privileges - pfSense Hangout February 2015
Netgate
 
Shall we play a game?
IngridRivera36
 
Ad

More from Mohammad Ashfaqur Rahman (20)

PDF
Cyber Security Considerations for 4IR in Bangladesh
Mohammad Ashfaqur Rahman
 
PPTX
Cyber Security For E-commerce (Infrastructure) development
Mohammad Ashfaqur Rahman
 
PPTX
Cyber Awareness : Perspective Bangladesh & Covid-19
Mohammad Ashfaqur Rahman
 
PPT
Cyber Security Awareness - file 1 of 2
Mohammad Ashfaqur Rahman
 
PPT
Cyber Security Awareness - file 2 of 2
Mohammad Ashfaqur Rahman
 
PPT
009.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
007.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
002.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
001.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PPT
000.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
PDF
Business Continuty Planning and Disester Recovry Planning
Mohammad Ashfaqur Rahman
 
PPT
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
DOC
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
PPT
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
DOC
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
PPT
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
DOC
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
PPT
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 
DOC
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 
PPT
009.safetymanagement v3
Mohammad Ashfaqur Rahman
 
Cyber Security Considerations for 4IR in Bangladesh
Mohammad Ashfaqur Rahman
 
Cyber Security For E-commerce (Infrastructure) development
Mohammad Ashfaqur Rahman
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Mohammad Ashfaqur Rahman
 
Cyber Security Awareness - file 1 of 2
Mohammad Ashfaqur Rahman
 
Cyber Security Awareness - file 2 of 2
Mohammad Ashfaqur Rahman
 
009.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
007.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
002.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
001.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
000.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Business Continuty Planning and Disester Recovry Planning
Mohammad Ashfaqur Rahman
 
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 
009.safetymanagement v3
Mohammad Ashfaqur Rahman
 
Ad

Recently uploaded (20)

PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PPTX
Unit II: Meteorology of Air Pollution and Control Engineering:
sundharamm
 
PDF
Natural Language processing and web deigning notes
AnithaSakthivel3
 
PDF
SMART HOME AUTOMATION PPT BY - SHRESTH SUDHIR KOKNE
SHRESTHKOKNE
 
PDF
勉強会資料_An Image is Worth More Than 16x16 Patches
NABLAS株式会社
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PPTX
Sensor IC System Design Using COMSOL Multiphysics 2025-July.pptx
James D.B. Wang, PhD
 
PPTX
UNIT III CONTROL OF PARTICULATE CONTAMINANTS
sundharamm
 
PPTX
Precedence and Associativity in C prog. language
Mahendra Dheer
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PDF
SG1-ALM-MS-EL-30-0008 (00) MS - Isolators and disconnecting switches.pdf
djiceramil
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PDF
July 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
IJNSA Journal
 
PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
PDF
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
PPTX
NEBOSH HSE Process Safety Management Element 1 v1.pptx
MohamedAli92947
 
PPTX
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
PPTX
Ground improvement techniques-DEWATERING
DivakarSai4
 
PPTX
Water resources Engineering GIS KRT.pptx
Krunal Thanki
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
Unit II: Meteorology of Air Pollution and Control Engineering:
sundharamm
 
Natural Language processing and web deigning notes
AnithaSakthivel3
 
SMART HOME AUTOMATION PPT BY - SHRESTH SUDHIR KOKNE
SHRESTHKOKNE
 
勉強会資料_An Image is Worth More Than 16x16 Patches
NABLAS株式会社
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Sensor IC System Design Using COMSOL Multiphysics 2025-July.pptx
James D.B. Wang, PhD
 
UNIT III CONTROL OF PARTICULATE CONTAMINANTS
sundharamm
 
Precedence and Associativity in C prog. language
Mahendra Dheer
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
SG1-ALM-MS-EL-30-0008 (00) MS - Isolators and disconnecting switches.pdf
djiceramil
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
July 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
IJNSA Journal
 
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
NEBOSH HSE Process Safety Management Element 1 v1.pptx
MohamedAli92947
 
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
Ground improvement techniques-DEWATERING
DivakarSai4
 
Water resources Engineering GIS KRT.pptx
Krunal Thanki
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 

006.itsecurity bcp v1

  • 1. Operating System & Server Security Presented by Mohammad Ashfaqur Rahman Compliance Professional www.linkedin.com/in/ashfaqsaphal [email protected]
  • 2. Objective ● Concept of OS security ● Possible attack on Operating System ● Hardening Example ● HW security
  • 3. OS Security ● Key functions of an operating system: – Computer resource management – Provides a user interface – Runs software utilities and programs – Enforce security measures – Schedules jobs
  • 5. OS Security ● In-build features – Authorization and Authentication – Resource Management – Response to remote process
  • 6. Attack ! ● Possible attack and known vulnerability – Authentication over the network • Password crack • Anonymous / Guest login – Restart / Shutdown machine – Rootkit placement – Access to resource • Activate / deactivate HW component • Identity theft
  • 7. Example : User Management ● 80%++ incident are due to insufficient control on user ● Best practice for user management – Password policy • Complexity • Trivial password management • Aging – Account / login locking • Too many authentication failure • Rename administrator account (windows) • Disable guest / nobody etc account – User group policy – Minimal file permission
  • 8. Example : Window Control Panel → Administrative Tools → Local Security Setting → Local Policies → Security Options ● Allow CD-ROM / Floppy Access to → localy autheticated user only ● Allow to format and Eject Removable Media to → Administrator only ● Require strong (windows 2000 or later) session key ● Restrict anonymous access to Named Pipes and shares ● Disable automatic execution of the system debugger ● Disable autoplay for new users by default ● Disable Dial-in access to other Server
  • 9. Example : Window Control Panel → Administrative Tools → Services ● FTP publishing service → Disable ● Telnet Service → Disable ● TFTP Service → Disable ● SMTP → Disable ● SNMP → Disable ● SNMP → Disable // In short disable the services which are not required
  • 10. Example : Linux ● Disable USB ● rm /lib/modules/2.6.18- 308.24.1.el5/kernel/drivers/usb/sto rage/usb-storage.ko ● Password / User data file permission ● chown root:root passwd shadow group gshadow ● chmod 644 passwd group ● chown root:root passwd shadow group gshadow
  • 11. Example : Linux ● Set Permission to file system file ● chown root:root /etc/fstab ● chmod 0644 /etc/fstab ● Set Umask ● /etc/sysconfig/init ● /etc/profile ● /etc/csh.login ● /etc/csh.cshrc ● /etc/bashrc
  • 12. Example : Linux ● Set permission of Log files ● for file in `cat /etc/syslog.conf | grep -v # | grep var | awk {'print $2'}`; do chmod 600 $file*;chown root:root $file*; done ● Restrict remote login of root user ● /etc/ssh/sshd_config
  • 13. Example : Linux ● Disable services that are not required ● for FILE in chargen chargenudp cups-lpd cups daytime daytime-udp echo echo-udp eklogin finger gssftp imap imaps ipop2 ipop3 krb5-telnet telnet klogin kshell ktalk ntalk pop3s rexec rlogin rsh rsync servers services sgi_fam shell talk telnet tftp time time-udp vsftpd wuftpd ● do ● chkconfig ${FILE} off ● done
  • 14. Example : Linux ● Enforce password policy ● /etc/login.def ● PASS_MAX_DAYS 45 ● PASS_MIN_LEN 8 ● PASS_MIN_DAYS 1 ● Enable password for boot loader (using /sbin/grub-md5-crypt) ● /etc/grub.conf ● password --md5 ● Implement SUDO ● /etc/sudoers
  • 15. Example : Linux ● Set authentication for single user mode ● /etc/inittab ● ~~:S:wait:/sbin/sulogin ● Restrict root access by “su” ● grep ^wheel /etc/group ● No member should be in “wheel” group
  • 16. Hardware Security ● OS and Physical Security both are required – OS should prevent malicious code execution – Physical environment should ensure • Managing temperature • Physical Access Control • Humidity Control
  • 17. Hardware Security ● Secure Deployment of hypervisor – Patching – Updated Software ● Updated Firmware ● Remove default username password ● Create personal user for administration ● Enable secure SNMP ● Disable SNMP Trap