Tuesday, March 12, 2019

Linux Security Essay

While researching the regulatory requirements needed for First area Bank Savings and Loans I found that a aegis policy against current emcee architecture is required to be implemented. The CIA (Confidentiality, Integrity, and Availability) triad is taken into account when analyzing the multiple servers in reference to Linux and Open Source managing security demands. The Database Server requires the administrators go further in terms of technical radiation diagram through a Linux architecture method. MySQL can be utilized as a backend and comes with script availability to remove test entropybases, lower systems and data base privileges (Jang, 2011). This method leave behind every(prenominal)ow successful requirement of all networking layers. The Apache Web Server allows the ability to harden the Linux kernel within Apache (Prashant, 2013).The tour available is grsecurity and allows protection against zero-day vulnerabilities while utilizing ksplice to update the kernal on ti me (Prashant, 2013). obechi is used for the file server and has many features to restrict access to what is shared. This includes enforcing give-and-take requirements, filtering at the network level, and a check going against group memberships (Jang, 2011). The SMTP server will be Send carry. Sendmail comes with the security feature of encrypting the connection (Jang, 2011). We will in addition need a virus scanning program to ensure mail coming in does not have virus attachments. The LDAP server will be utilized as the central authentication server so that the involved users have a login that is unified and covers all console logins (LDAP NExt, 2010). work CitedJang, M. (2011). Security Strategies in Linux Platforms and Applications. Jones & Bartlett Learning. LDAP NExt. (2010, 06). The official Red Hat telephone extension Guide. Retrieved from http//www.centos.org/docs/2/rhl-rg-en-7.2/s1-ldap-uses.html Prashant, P. (2013, 10 10). Linux for you. Retrieved from http//www.linuxfo ru.com/2011/05/securing-database-servers/.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.