TAILIEUCHUNG - Securing and Auditing Unix

Welcome to Unix and Linux, security for these operating systems is a complete paradigm shift from Windows. Unix has been around a lot longer. The source code for Linux is freely available, so would be attackers are free to examine it and test it for holes such as buffer overflows and deadlock conditions. | Securing and Auditing Unix Examples tested on a Red Hat Linux Hedwig build Secure System Administration - SANS GIAC 2000 2001 1 Welcome to Unix and Linux security for these operating systems is a complete paradigm shift from Windows. Unix has been around a lot longer. The source code for Linux is freely available so would be attackers are free to examine it and test it for holes such as buffer overflows and deadlock conditions. Linux is different than Unix. Has the source code been available for Unix Certainly you used to be able to license source for both the ATT and BSD versions of Unix. It is rumored the Sun source code was stolen once via a workstation with a modem connection. This means that we are dealing with a lot more knowns than with Windows. Well at least that was true until October 2000 and critical Microsoft source code was stolen. From now on the rules of the game are who knows the most wins . Let s start our discussion with the notion of a firm foundation. Nothing is certain but if we can start with a clean build we have a better chance of ending up with a secure system. 1 A Clean Build is a Happy Build Load from CD Load from Net Load from another system Load from tape Secure System Administration - SANS GIAC 2000 2001 2 Windows loads from CDs. They are licensed and controlled. Though it is possible there could be a compromised version it is unlikely. The initial load of Unix can be a whole new ballgame. Many Unix systems make it easy to clone a system from an existing system. You plug in your Ethernet cable power on the system and the new computer looks for a system to boot from. This is great. unless the system you boot from is already compromised. The same thing goes for backup tapes. This is a big problem in incident handling. How do you know you are loading from a clean operating system For Linux it is possible to load from an Internet site but in general it is best to load from the CDROM. If you start out compromised you may never get .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.