Vous êtes sur la page 1sur 5

Lab 1 Is3440 Linux Security

---------------------------------------------------------------------------------------------------------------------

1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a
security perspective, why is it important for a system to keep accurate time?

The most interesting importance of NTP would be the auto key system, if your system doesnt keep
correct time a attacker who needs to change time so that a replay attack can happen could be very
damaging, that is why todays version of NTP shields against this in several ways.



2. During the install, a password has been set for the root user, and when is it appropriate to use this
account?

It is highly recommended that you only use this account when there are tasks that require root
privileges such as moving files or directories into or out of system directories.



3. During the install, X-Window and a Desktop Manager were installed. However, in a production
environment it is recommended NOT to run the X-Windows Environment. Explain the purpose for this
recommendation?

In a production environment hardware requirements and not to run the X-Windows Environment may
sometimes vary, X-Window is intended for primarily workstation use only example personal computing
on a Linux box. The X-Window was intended and developed for the network GUI only, X-Windows by
itself doesnt even have an interface.



4. During the install process it asks what the options given to create the partition are? Name them?

It asked would I like to create Primary or an extended partition once I decided that I had to tell Linux
how big was the partition was going to be which I was giving the lines of First Cylinder. First Cylinder
shows me the amount of free space I created earlier so after I decide that a new option of Last Cylinder
appeared. Last Cylinder asked select the default value that I selected during the First Cylinder process
then next I had to tell FDISK what kind of partition I have.



5. Why is it important to partition a Linux System Correctly?

It is very important to partition a Linux System properly because of varies reasons first would be the
ease of use; installing a partition on your Linux system properly makes it easier and less complicated to
recover corrupted files or a operating system installation. Other importance of a partition of a Linux
System would be great performance, security, backup and recovery, stability and efficiency, and the
most important would be testing. Testing is important because it would be best to boot multiple
operating systems such as Free BSD, Linux, and Windows. There are different types of partitions on
Linux such as /usr, /var, /tmp, /boot, /home.



6. What is the significance of the SWAP partition in a Linux System? What different ways can the swap
partition space be configured, and why would you recommend one over the other?

Temporary space $, its swapping information between the memory and the disk. By using SWAP
partitions, server performance can be greatly improved, I recommend Swap over other partitions
because even though it makes my physical RAM slower it actually works. There are several ways to
configure the swap partition for example if I have a 0KB as a swap partition and I want to configure swap
space to 2GB, first I would create a SWAP partition of 2GB with Fdisk then I would create the file system
such as mkswap / dev/ hdaX) and finally add a new entry to the /etc/fstab file.



7. What are some of the benefits and features that are available to Linux users by selecting the ext4
file system for Linux partitioning?

Features for Linux users includes Sub second timestamps, Journal checksumming, Defragment support,
Large 16T file system support, Space reallocation, and Large >2T file system. Benefits for users are better
file system support, faster checking, and better stability for desktop and server needs.





8. How is the passwd file used, and what fields make up its content?

The passwd file is used to keep to in track of every user on the system. This file consist of your user
name, real name, identification information, and much more. The fields that make up its content are
Rachel, eH5/.mj7NB3dx, 181, 100, Rachel Cohen, and /u/rachel, /bin/ksh.



9. What is the fstab file used for and what fields make up its content?

This file keeps in track of disk devices and there mount points on the UNIX directory tree. There are six
fields that makes up its content which are device name, mount point, file system type, options, dump,
and needs checked.





10. Explain the significance of creating separate partitions of the /var and /boot directories? What is
contained in those directories?

/Var contain files that are expected to grow such as system logs, packages and database files, emails,
print queues, and lock files. /Boot files contain boot loader related files only such as Kernal intitrd,
vmlinux, and grub files. /Var cannot be made as a separate partition is it often best to move /var out of
the root partition and into the /usr partition. The /Boot Directory is much different and can be a
separate partition. Here are the steps; create a partition and format on ext4 or ext2, copy contents from
old /Boot folder to new partition root, Edit fstab with a separate boot entry, and run grub-install for the
new boot location which would be using the (boot-directory=option).



11. How would selecting the option encrypt file system be useful?

It is very useful simply to avoid someone attacking your personal information so encrypt file system
has great security counter measures; this file system has always protected data files within the system.



12. How can portioning with the Logical Volume Manager (LVM) help as it relates to the C.I.A. Triad of
security?

Keep everything up to date and make sure all applications are running perfectly.



13. What security advantages can be realized when selecting the minimal software install option?

If I install the minimal of applications such as a smart phone will use less disk space the more
applications I install will make my network slow, it will be best to check your process and if there are any
applications running you should kill them immediately.



14. How could you automate a fedora install geard for security?

If I use yum to install hacking tools I can simply install a shell chip or create a script and automate in a
script so only a certain amount of applications install automatically.





15. What is the purpose of first boot?

The purpose of a first boot is a program that runs after installing Fedora, the first boot enables us to
configure and set up language, display welcome screen, license screen, as well as giving us the option to
choose a keyboard layout, create your personal root password, setting up networking, security level,
configuring time zone and date.

Vous aimerez peut-être aussi