Saturday, April 7, 2018

Wednesday, April 4, 2018

Configuring Linux Properly

An in-depth review of Linux security would be a lengthy task indeed. One reason is the diversity of Linux setups. Users could be using Debian, Red Hat, Ubuntu, or other Linux distributions. Some might be working from the shell, while others work from some graphical user interfaces such as KDE or GNOME (for Windows users not familiar with Linux you might want to consult my book Moving from Windows to Linux). Fortunately, many of the same security concepts that apply to Windows can be applied to Linux. The only differences lie in the implementation, as explained in the following list:

• User and account policies should be set up the same in Linux as they are in Windows, with only a few minor differences. These differences are more a matter of using different names in Linux than in Windows. For example, Linux does not have an administrator account; it has a root account.

• All services (called daemons in Linux) not in use should be shut down.

• The browser must be configured securely.

• You must routinely patch the operating system.

In addition to these tactics that are common to Windows and Linux, a few approaches are different for the two operating systems:

• No application should run as the root user unless absolutely necessary. Remember that the root user is equivalent to the administrator account in Windows. Also remember that all applications in Linux run as if started by a particular user, and therefore having an application run as root user would give it all administrative privileges.

• The root password must be complex and must be changed frequently. This is the same as with Windows administrator passwords.

• Disable all console-equivalent access for regular users. This means blocking access to programs such as shutdown, reboot, and halt for regular users on your server. To do this, run the following command: [root@kapil /]# rm -f /etc/security/console.apps/<servicename>, where <servicename> is the name of the program to which you want to disable console-equivalent access.

• Hide your system information. When you log in to a Linux box, it displays by default the Linux distribution name, version, kernel version, and the name of the server. This information can be a starting point for intruders. You should just prompt users with a “Login:” prompt.

To do this, edit the /etc/rc.d/rc.local file and place # in front of the following lines, as shown:

# This will overwrite /etc/issue at every boot. So, make any changes you
# want to make to /etc/issue here or you will lose them when you reboot.
#echo "" > /etc/issue
#echo "$R" >> /etc/issue
#echo "Kernel $(uname -r) on $a $(uname -m)" >> /etc/issue
#
#cp -f /etc/issue /etc/issue.net
#echo >> /etc/issue
Remove the following files: "issue.net" and "issue" under "/etc" directory:
[root@kapil /]# rm -f /etc/issue
[root@kapil /]# rm -f /etc/issue.net

In general, security concepts apply regardless of operating system. However, truly hardening any operating system requires a certain level of expertise with that particular operating system.

The following websites provide information useful for helping you secure your Linux server:

• Linux Security Administrators Guide: www.linuxsecurity.com/docs/SecurityAdminGuide/SecurityAdminGuide.html

• Linux.com: www.linux.com/

FYI: Patch Conflicts

A patch could possibly conflict with some software or settings on your system. To avoid these conflicts, you should first apply patches to a test machine to ensure no conflicts exist before you apply it to production machines.

Tuesday, March 20, 2018

IP forwarding

However, for firewalls using multiple interfaces, ensure that you disable the TCP/IP protocol feature IP forwarding. IP forwarding is actually a router rule that allows traffic from one interface to traverse to another interface without needing to move any further up the protocol stack than where IP resides. In many cases, IP forwarding allows packets to bypass filtering. If you’re using the system as a firewall, be sure to disable this feature.


(Stewart 316)
Stewart, J. M. Network Security, Firewalls and VPNs, 2nd Edition. Jones & Bartlett Learning, 07/2013. VitalBook file.
The citation provided is a guideline. Please check each citation for accuracy before use.

ShieldsUP

An excellent way to test your configuration is to go to Steve Gibson’s http://www.grc.com Web site and run his free ShieldsUP! port scanning tool. Most people end up scoring poorly. If you can achieve 100 percent stealth, you’ve done a great job.


(Stewart 314)


Stewart, J. M. Network Security, Firewalls and VPNs, 2nd Edition. Jones & Bartlett Learning, 07/2013. VitalBook file.
The citation provided is a guideline. Please check each citation for accuracy before use.

Converting a home router into a Firewall


Saturday, March 17, 2018

O monitoramento do local de trabalho também pode ser usado para:


• Certificar-se de que os funcionários utilizam corretamente os dados confidenciais da organização

• Verificare se os funcionários não estão violando outras políticas (como políticas de uso aceitáveis)

• Proteger a empresa por atos ruins cometidos por funcionários


  (Grama 56)

Grama, Joanna L. Questões legais em segurança da informação - E-Book Bundle. Jones & Bartlett Learning, 08/2017.

Importância dos Cookies para segurança da Informação

Um cookie é uma pequena seqüência de texto que um site comercial armazena no computador de um usuário. Você não pode executá-los como um arquivo de programa. Os cookies não são considerados spyware porque não são executáveis. Por si só não é perigoso ou uma ameaça à privacidade. No entanto, outros indivíduos e empresas podem usar cookies para invadir sua privacidade.

Existem dois tipos de cookies:

• Cookies de primeiro nível - trocados entre o navegador de um usuário e o site que o usuário está visitando.

• Cookies de terceiros - Definido por um site da Web, mas legível por outro site. Os cookies de terceiros são definidos quando a página da Web que uma visita do usuário tem conteúdo nela está hospedada em outro servidor.

Os cookies são usados ​​para muitas coisas que a maioria dos usuários de computadores consideram benéfico. Por exemplo, eles podem ser usados ​​por um site para lembrar informações sobre visitantes do site. Eles também podem salvar suas configurações se você "personalizar" um aplicativo da Web que você usa regularmente.

 (Grama 49)

Grama, Joanna L. Questões legais em segurança da informação - E-Book Bundle. Jones & Bartlett Learning, 08/2017.

The Nexus of Policy and Technology: An Expert Report on Allegations of Political Bias in Gmail's Spam Filtering

  Executive Summary: The Nexus of Policy and Technology The Federal Trade Commission (FTC) has initiated a new wave of regulatory scrutiny a...