Вы находитесь на странице: 1из 10

NORHAFIZANAJWA BT AHMAD RUDIN MOHD NORLIHAZMEY BIN GHAZALI CHONG KWANG SHIUNG

CB11013 CB CB11014

User and Group Related Security Concerns


Password

Fedora provide 2 ways password which is shadow password and md5 password.
i.

MD5 : If MD5 passwords are deselected during installation, the older Data Encryption Standard (DES) format is used. Shadow password : if shadow passwords are deselected during installation, all passwords are stored as a one-way hash in the world eadable /etc/passwd file, which makes the system vulnerable to offline password cracking attacks.

i.

Forces change password

Technique used by system administrators to defend against bad passwords within an organization. ii. Password aging means that after a specified period (usually 90 days), the user is prompted to create a new password.
i.

File system related security problems.


File systems break files down into two logical categories:

Shareable vs. unsharable files Variable vs. static files

Shareable files - can be accessed locally and by remote hosts. ii. unsharable files - are only available locally. iii. Variable files - such as documents, can be changed at any time. iv. static files - such as binaries, do not change without an action from the system administrator.
i.

Fedora uses the Filesystem Hierarchy

Standard (FHS) file system structure, which defines the names, locations, and permissions for many file types and directories( can avoid from other users access file not related to them)

LOGFILE ANALYSIS
Log files are files that contain messages about the

system, including the kernel, services, and applications running on it. There are different log files for different information. For example, there is a default system log file, a log file just for security messages, and a log file for cron tasks. ( fedora use logfile for security message)

(protection) - Log files can be very useful when trying

to troubleshoot a problem with the system such as trying to load a kernel driver or when looking for unauthorized log in attempts to the system. This chapter discusses where to find log files, how to view log files, and what to look for in log files.

NETWORK RELATED SECURITY PROBLEMS


Firewall

Firewalls prevent network packets from accessing the system's network interface(protection and security). ii. Firewall Configuration Tool (system-configfirewall). This tool creates broad iptables rules for a general-purpose firewall using a control panel interface
i.

SSH encrypt network - Security Enhanced Communication Tools Fedora ships with two basic tools that use highlevel, public-key-cryptography-based encryption algorithms to protect information as it travels over the network. i. OpenSSH A free implementation of the SSH protocol for encrypting network communication. ii. Gnu Privacy Guard (GPG) A free implementation of the PGP (Pretty Good Privacy) encryption application for encrypting data.

THANK YOU