Documente Academic
Documente Profesional
Documente Cultură
CB11013 CB CB11014
Fedora provide 2 ways password which is shadow password and md5 password.
i.
MD5 : If MD5 passwords are deselected during installation, the older Data Encryption Standard (DES) format is used. Shadow password : if shadow passwords are deselected during installation, all passwords are stored as a one-way hash in the world eadable /etc/passwd file, which makes the system vulnerable to offline password cracking attacks.
i.
Technique used by system administrators to defend against bad passwords within an organization. ii. Password aging means that after a specified period (usually 90 days), the user is prompted to create a new password.
i.
Shareable files - can be accessed locally and by remote hosts. ii. unsharable files - are only available locally. iii. Variable files - such as documents, can be changed at any time. iv. static files - such as binaries, do not change without an action from the system administrator.
i.
Standard (FHS) file system structure, which defines the names, locations, and permissions for many file types and directories( can avoid from other users access file not related to them)
LOGFILE ANALYSIS
Log files are files that contain messages about the
system, including the kernel, services, and applications running on it. There are different log files for different information. For example, there is a default system log file, a log file just for security messages, and a log file for cron tasks. ( fedora use logfile for security message)
to troubleshoot a problem with the system such as trying to load a kernel driver or when looking for unauthorized log in attempts to the system. This chapter discusses where to find log files, how to view log files, and what to look for in log files.
Firewalls prevent network packets from accessing the system's network interface(protection and security). ii. Firewall Configuration Tool (system-configfirewall). This tool creates broad iptables rules for a general-purpose firewall using a control panel interface
i.
SSH encrypt network - Security Enhanced Communication Tools Fedora ships with two basic tools that use highlevel, public-key-cryptography-based encryption algorithms to protect information as it travels over the network. i. OpenSSH A free implementation of the SSH protocol for encrypting network communication. ii. Gnu Privacy Guard (GPG) A free implementation of the PGP (Pretty Good Privacy) encryption application for encrypting data.
THANK YOU