This website uses cookies to ensure you have the best experience. Learn more

Linux Security Essay

3426 words - 14 pages

Securing Linux Platforms and Applications Project

Project Part 1 Task 1: Outline Security Policy

This security policy is essential to the First World Bank Savings and Loan. It is used to break up the security plan not measurable, specific, and testable goals and objectives.
This security policy would be used to provide all current and prospective customers online banking services while keeping the First World Saing bank competitive in the financial marketplace. This solution is also an imperative due to an estimated revenue of $100,0000,000 flowing in by virtue of online credit card transactions specific to banking and loan application based services. This security policy will go on ...view middle of the document...

Availability aspect with reference to First World Savings Bank – Availability refers to the principle that states that individuals or systems need to be granted timely access to the required information and other resources to perform the required operations.
The process of conducting financial transactions and overall business using internet to move money throughout various accounts, conduct business using credit cards, and allowing customers to view their account details, past transactions, and pertinent details have to comply with a number of government regulations.
A number of possible penalties for any on-compliance including but not limited to jail-time and monetary violations need to be adhered to via performing the required audits as per the statutory specifications. Any violation found in the company need to be delt with as war the guidelines laid down by the government.
A number of security access control mechanism are recommended in order to establish a comprehensive security system such as using LSM (Linux Security Module). The process of using unique user-id a password combination for system access does well from user management perspective but poses serious threats from a system vulnerability standpoint. This gap can be closed by using LSM that can provide a multitude of access control models to be created and deployed.
Many enhanced access control implementations such as DTE (Domain and Type Enforcement) , SELinux, ad LIDS(Linux Intrusion Detection System) need to be enabled via the ability of threads belonging to security-enhanced control implementation to work independently of the main Linux kernel.

Project Part 1 Task 2: Provide Open Source Server Solutions
There are a number of open source software that can be used in the Savings and Loan division of the First World Bank. Each of them has its strengths and below are my recommendations along with the underlying rationale:
1. SugarCRM - This software suite belongs to the CRM (Customer Relationship Management) domain and is known for its marketing model and disruptive engineering approach. SuagrCRM can be engaged in a commercial relationship with a customer while you continue to use the out of the box product offering with standard functionality. This unique model and the corresponding value proposition has resulted in SuagrCRM being one of the leading CRM product. I would still recommend against using SugarCRM as it is known to have security flaws that make it more vulnerable to hacker attacks.
2. Mono - This technology is sponsored by Novell and combines two seemingly different worlds of Microsoft and*nix into a single agile, open source and stable realm. Mono is the open-source implementation of Microsoft's.NET technologies. Mono allows you to develop advanced and powerful applications (server-side) on Linux, Mac OS X, and Windows.

3.Zenoss - Zenoss consists of an alert console, network discovery, performance monitoring, service monitoring, and inventory...

Other Essays Like Linux Security

Exploring Unix/Linux to Understand Operating Systems

2443 words - 10 pages history, influence, structure and features. UNIX and Linux are both operating systems designed to be portable, multitasking and multi-user platforms in a time-sharing configuration. An operating system or OS is a program that allows you to interact with all of the software and hardware on your computer (Haas). These two operating systems offer all the basics needed to understand how operating systems work. Their history, security and performance

Support & Maintenance Plan Summary Essay

567 words - 3 pages certifications.” (Novell, Inc., 2010) Certainly by outsourcing to the developers of the server Kudler is purchasing will the best support and maintenance to be found.With a subscription to Novell’s SUSE Linux Enterprise support, Novell has the responsibility of providing a number of features. This includes:* Award-winning technical support,* First Look on-demand training,* Maintenance updates, service pack releases, hardware enablement and security

History of Java

1006 words - 5 pages caused debuggers to miss breakpoints. Java SE 6 Update 17: Security fixes; 2 new root certificates. * 2010 - Java SE 6 Update 18: No security fixes; Hotspot VM 16; support for Ubuntu 8.04 LTS Desktop Edition, SLES 11,Windows 7, Red Hat Enterprise Linux 5.3, Firefox 3.6, VisualVM 1.2; updated Java DB; many performance improvements. Java SE 6 Update 19: Security fixes; root certificate changes: seven new, three removed, five

It-302-Linux System Administration

925 words - 4 pages Computer security is necessity because of the many ways that your personal information. Millions of people each year are victims of hacked computers and accounts which lead to credit card theft and identity theft. This paper will explain a few of Unix/Linux’s security operations such as SELinux, Chroot, and IPtables. Security-Enhanced Linux is a Linux feature that provides a mechanism for supporting access control security policies, including

Unix Vs Windows

3521 words - 15 pages security, but Linux is cheaper for Web serving. At the high end, IDC estimates that running a file server will cost a typical Windows site $99,048 over a five-year period, versus $114,381 for Linux user. A Web server costs only slightly less to run on Linux - $30,000, versus $32,000 for Windows.Market ShareOne of the biggest battles that occur between companies that operate for profit is for market share. Market share is the percentage of industry

Itech 1005

3449 words - 14 pages ................................................................................................. 5 TOPIC 2. CONFIGURING IP IN WINDOWS AND LINUX ....................................................... 5 2.1 IPV4 ADDRESS ...................................................................................................................... 5 PRIVATE AND PUBLIC IP ADDRESSES ................................................................................................... 5 RELATIONSHIP BETWEEN

Types of Operating System

2888 words - 12 pages processors using multiprocessing. For this reason, some computer professionals call UNIX a multipurpose operating system because it is both a stand-alone and server operating system. Many Web servers use UNIX as their operating system. (ii) Linux Some network servers use Linux as their operating system. Thus, Linux also is a multipurpose operating system. With Linux, a network administrator can configure the network, administer security

Pos/420 Week4

533 words - 3 pages The operating system that I use for work runs on Windows 7 Enterprise and for work purposes it works well. I am in the Army so money is typically no issue when acquiring tech support from the Microsoft end as well as through here at work. If I did work for a smaller company, I might be more open to utilizing Linux into the work place. I am no expert, but I have been experimenting with the Ubunto system. One of the main differences that is

Development of Popular Operating Systems

1876 words - 8 pages designed for client-server networks. Windows NT is a complete operating system but not an operating environment. The advantages of Windows NT is that it is capable of working with multiple CPUs using symmetric multiprocessing, also it allows multitasking and multithreading, it has support for most major networking communications protocols, and Windows NT also includes the user and account system security. The disadvantages of the Windows NT are

Sec280 Week2

824 words - 4 pages There are some basic safeguards that are important in ensuring that the network infrastructure remains secure for both of the Windows based server and the UNIX/Linux based server. Although both servers utilize the basic level of security, there are vulnerabilities that exist that could be exploited if additional measures are not taken to address them. The following information outlines the steps that are currently in place to address server and

Linux As A Personal Desktop Operating System

5191 words - 21 pages ............................................................................................................450 Chapter 10: Advanced System Administration ...................................................................................450 Chapter 12: Security...........................................................................................................................450 vii Beginning Red Hat Linux 9 Sandip Bhattacharya, Pancrazio De Mauro, Shishir Gundavaram, Mark Mamone

Related Papers

Linux Security Technologies Essay

1105 words - 5 pages comes with many great security features that any user or administrator greater access and control over the system. The choice can be a bit much for most, but we will discuss a few of these choices here. Security-Enhanced Linux also known as SELinux is a security program that was developed in partner by the National Security Agency or NSA and Red Hat Developers (“Fedora Project”). So what exactly is it that SELinux does? SELinux was designed

Dfsdfsd.Pdf Essay

1326 words - 6 pages Guide to Linux+ (2nd Edition) ISBN 0-619-21621-2 End of Chapter Solutions Chapter 1 Solutions Review Questions 1. Every computer consists of physical components and logical components. The logical components of a computer that understand how to work with the physical components are referred to as: a. hardware b. records c. software d. processors Answer: c 2. The operating system

Deploying An Operation System Within Your Organization

1275 words - 6 pages evolved from a monochrome GUI on a small screen in 1984 to a large, lavish and polished one today. Beneath the good looks lie the powerful UNIX kernel, which provides flexibility, stability and security. Mac OS X is also proprietary as well, though the kernel (the foundation of an operating system) is derived from BSD UNIX, which is governed by open-source model (see more about open-source in the Linux section). Most of the system is closed

Securing A Linux System Essay

985 words - 4 pages Unit 1 Discussion 1: Securing a Linux System Learning Objectives and Outcomes * You will present different views on security related to a Linux system. * You will be able to identify risks related to the implementation of a Web application in a Linux environment. Assignment Requirements A small community bank is studying the prospect of maintaining its own in-house Linux Web server for a Web application. The Web application will allow