Cs04computer Security
Cs04computer Security
● Vulnerable to spoofing-
●Spoofing is the term for establishing a connection with
a fake sender address.
●The ability to spoof the source IP address assists those
carrying out DoS attacks by making it difficult for
victims to block the DoS traffic, and the predictability
of the initial sequence number (ISN), which is a
unique number that is supposed to guarantee the
authenticity of the sender.
Access Control Lists
●An effective security model recognizes and is built
around the fact that because security is such an
important design goal for the operating system, every
resource that the operating system interfaces with
(memory, files, hardware, device drivers, and so on)
must interact from a security perspective.
●By giving each of these objects an access control list
(ACL), the operating system can detail what that object
can and can’t do by limiting its privileges.
Access Control Lists
●Access control enables you to protect a server or parts
of the server (directories, files, file types, and so on).
●When the server receives a request, it determines
access by consulting a hierarchy of rules in the ACL.
●An access control list is defined as a table that tells a
computer operating system which access rights each
user has to a particular system object, such as a file
directory or an individual file.
●When the server receives a request, it determines
access by consulting a hierarchy of rules in the ACL.
Access Control Lists
●The most common privileges include the ability to
read a file (or all the files in a directory), to write to the
file or files,and to execute the file (if it is an executable
file or program).
● There are different kind of system implement ACL
● 1)Filesystem ACL
● 2)Network ACL
The principles of securing a Linux system
-
●By following some procedures we can make Unix much more resistant to
attack.
Privileges of Administrators
● Back Up Your System
Securing infrastructure services
WEB SERVER -
●