SlideShare a Scribd company logo
Basic Linux/System Security
Physical Security Physical access to machines Switches instead of hubs
Principle of least privilege Fewest accounts necessary Fewest open ports necessary Fewest running applications
Root Account Used as little as possible Master key to a building Apps use other accounts, if possible People use su, sudo http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/sudo.v80.htm
Passwords >=7 characters Mixed case, letters and symbols Not names or words Keep private Don’t leave them out in the open Change once a month to 6 months Passphrases http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/essential_host_security.htm
Open ports Close all unneeded applications “ netstat –anp” or lsof to see what’s open Ntsysv, linuxconf to shut down Firewalls as a special case for a network Disable, or at least limit, file sharing http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/essential_host_security.htm
Plaintext network connections Email, telnet, web traffic Sniffers http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/ssh-intro.htm
Encrypted network connections Ssh Terminal session File copying Other TCP connections http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/ssh-techniques.v0.81.htm IPSec All packets traveling between systems or networks http://www.freeswan.org https web servers  http://httpd.apache.org/related_projects.html
Package updates Available from Linux distribution vendor Sign up for announcements list Use automated update tools: up2date, red carpet http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/essential_host_security.htm
Intrusion Detection System Snort  Reports on attack packets based on a regularly updated signature file Install inside the firewall http://www.snort.org
Advanced techniques Audited OS: OpenBSD  http://www.openbsd.org Stack overflow protected OS: Immunix  http://www.immunix.org Chroot applications, capabilities Virtual machines: VMWare and UML http://www.vmware.com ,  http://www.user-mode-linux.sourceforge.net TCFS  http://tcfs.dia.unisa.it
Resources Distribution security announcements list ISTS Knowledgebase  http://www.ists.dartmouth.edu/IRIA/knowledge_base/index.htm Worm characterizations and removal tools Linux and network security papers covering many of today’s topics Ssh key installer  ftp://ftp.stearns.org Sans training  http://www.sans.org Bastille Linux  http://www.bastille-linux.org

More Related Content

PPTX
Linux security
PPT
Security and Linux Security
ODP
Linux commands
PPTX
User and groups administrator
PPT
Introduction To SELinux
PPT
Intro to linux
PPTX
Linux User Management
PPT
Samba server configuration
Linux security
Security and Linux Security
Linux commands
User and groups administrator
Introduction To SELinux
Intro to linux
Linux User Management
Samba server configuration

What's hot (20)

PPTX
Basic commands of linux
PDF
Network Security Presentation
PPTX
Samba power point presentation
PDF
USB Drivers
PDF
PDF
An Introduction To Linux
PPT
Ch02 System Threats and Risks
PPTX
Five Major Types of Intrusion Detection System (IDS)
PPT
Ch07 Access Control Fundamentals
PPTX
Server hardening
PPTX
Presentation on samba server
PDF
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
PPTX
Operating system security
PPTX
Linux System Monitoring
PDF
Linux systems - Linux Commands and Shell Scripting
PPTX
Understanding NMAP
PDF
Secure by Design - Security Design Principles for the Rest of Us
PDF
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Linux security introduction
Basic commands of linux
Network Security Presentation
Samba power point presentation
USB Drivers
An Introduction To Linux
Ch02 System Threats and Risks
Five Major Types of Intrusion Detection System (IDS)
Ch07 Access Control Fundamentals
Server hardening
Presentation on samba server
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Operating system security
Linux System Monitoring
Linux systems - Linux Commands and Shell Scripting
Understanding NMAP
Secure by Design - Security Design Principles for the Rest of Us
Network security (vulnerabilities, threats, and attacks)
Linux security introduction
Ad

Viewers also liked (20)

PPTX
Linux Security Overview
PPT
Threats, Vulnerabilities & Security measures in Linux
PPT
Linux Operating System Vulnerabilities
PPT
Unix Security
ODP
Introduction To Linux Security
PDF
How Many Linux Security Layers Are Enough?
PPT
Linux Security
PDF
linux security: interact with linux
PDF
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
PDF
Linux Security Scanning with Lynis
PDF
Partners Healthcare Case Analysis
PDF
Linux Hardening
PDF
Linux Security, from Concept to Tooling
PPTX
System protection in Operating System
PPTX
Security & protection in operating system
PPTX
Developer < eat love code >
PDF
Security & Cryptography In Linux
PDF
Why linux is better than windows
PDF
Protection in Operating System Layer
PPTX
Unitrends Sales Presentation 2010
Linux Security Overview
Threats, Vulnerabilities & Security measures in Linux
Linux Operating System Vulnerabilities
Unix Security
Introduction To Linux Security
How Many Linux Security Layers Are Enough?
Linux Security
linux security: interact with linux
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Linux Security Scanning with Lynis
Partners Healthcare Case Analysis
Linux Hardening
Linux Security, from Concept to Tooling
System protection in Operating System
Security & protection in operating system
Developer < eat love code >
Security & Cryptography In Linux
Why linux is better than windows
Protection in Operating System Layer
Unitrends Sales Presentation 2010
Ad

Similar to Basic Linux Security (20)

PDF
7 unixsecurity
ODP
Securing Your Moodle
PPT
Addmi 03-addm prerequisites
PPT
Low cost multi-sensor IDS system
PPT
Ch08 Microsoft Operating System Vulnerabilities
PPT
Microsoft Operating System Vulnerabilities
PPT
Microsoft OS Vulnerabilities
PPT
Download It
PPTX
Palo Alto Networks PAN-OS 4.0 New Features
ODP
Nadhiya lamp
PDF
Linux security quick reference guide
PPT
Windows network security
PPT
Freeware Security Tools You Need
PPT
Internet Security
PPT
How hackers attack networks
PPT
Install and configure linux
PPT
Linux filesystemhierarchy
PDF
Hardening Linux, introducing Securix GNU/Linux
PPT
Ch 22: Web Hosting and Internet Servers
PPT
Linux Vulnerabilities
7 unixsecurity
Securing Your Moodle
Addmi 03-addm prerequisites
Low cost multi-sensor IDS system
Ch08 Microsoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
Microsoft OS Vulnerabilities
Download It
Palo Alto Networks PAN-OS 4.0 New Features
Nadhiya lamp
Linux security quick reference guide
Windows network security
Freeware Security Tools You Need
Internet Security
How hackers attack networks
Install and configure linux
Linux filesystemhierarchy
Hardening Linux, introducing Securix GNU/Linux
Ch 22: Web Hosting and Internet Servers
Linux Vulnerabilities

More from pankaj009 (6)

PDF
Ipv6 Certificate
PDF
Idc Reducing It Costs With Blades
PDF
Open Virtualization 2
PDF
Sunserver Open Solaris
PDF
Virtual Directory
PDF
Idc Reducing It Costs With Blades
Ipv6 Certificate
Idc Reducing It Costs With Blades
Open Virtualization 2
Sunserver Open Solaris
Virtual Directory
Idc Reducing It Costs With Blades

Basic Linux Security

  • 2. Physical Security Physical access to machines Switches instead of hubs
  • 3. Principle of least privilege Fewest accounts necessary Fewest open ports necessary Fewest running applications
  • 4. Root Account Used as little as possible Master key to a building Apps use other accounts, if possible People use su, sudo http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/sudo.v80.htm
  • 5. Passwords >=7 characters Mixed case, letters and symbols Not names or words Keep private Don’t leave them out in the open Change once a month to 6 months Passphrases http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/essential_host_security.htm
  • 6. Open ports Close all unneeded applications “ netstat –anp” or lsof to see what’s open Ntsysv, linuxconf to shut down Firewalls as a special case for a network Disable, or at least limit, file sharing http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/essential_host_security.htm
  • 7. Plaintext network connections Email, telnet, web traffic Sniffers http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/ssh-intro.htm
  • 8. Encrypted network connections Ssh Terminal session File copying Other TCP connections http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/ssh-techniques.v0.81.htm IPSec All packets traveling between systems or networks http://www.freeswan.org https web servers http://httpd.apache.org/related_projects.html
  • 9. Package updates Available from Linux distribution vendor Sign up for announcements list Use automated update tools: up2date, red carpet http://www.ists.dartmouth.edu/IRIA/knowledge_base/linuxinfo/essential_host_security.htm
  • 10. Intrusion Detection System Snort Reports on attack packets based on a regularly updated signature file Install inside the firewall http://www.snort.org
  • 11. Advanced techniques Audited OS: OpenBSD http://www.openbsd.org Stack overflow protected OS: Immunix http://www.immunix.org Chroot applications, capabilities Virtual machines: VMWare and UML http://www.vmware.com , http://www.user-mode-linux.sourceforge.net TCFS http://tcfs.dia.unisa.it
  • 12. Resources Distribution security announcements list ISTS Knowledgebase http://www.ists.dartmouth.edu/IRIA/knowledge_base/index.htm Worm characterizations and removal tools Linux and network security papers covering many of today’s topics Ssh key installer ftp://ftp.stearns.org Sans training http://www.sans.org Bastille Linux http://www.bastille-linux.org

Editor's Notes

  • #2: The Investigative Research for Infrastructure Assurance (IRIA) group is part of the Institute for Security Technology Studies (ISTS) at Dartmouth College. IRIA focuses on electronic crimes that involve or target computer networks, for example, the denial-of-service attacks that shut down Yahoo and other major web sites in February, 2000. Our web site at http://www.ists.dartmouth.edu/IRIA/ has more information about our projects and staff.
  • #9: Both tools provide strong authentication for the host by checking a host key at each connection setup. If the host key changes, loud warnings go out and packets are not allowed to pass. Ssh also authenticates the user making the connection, by means of a password or passphrase.