Security features in LINUX
Q. Discuss the security features in LINUX with respect to the following : (i) User Accounts (ii) File Permissions (iii) Encrypted Storage (iv) Remote Access
Security Features in LINUX
(i) User Accounts
- Multi-User Environment: Linux allows multiple user accounts, isolating user data and processes for enhanced security.
- Root Privileges: The superuser (
root
) has administrative rights, and access to these rights is tightly controlled. - User Groups: Organizes users into groups, enabling precise access control to files and resources.
- Login Security:
- PAM (Pluggable Authentication Modules) supports customizable authentication mechanisms.
- Tools like
faillog
track failed login attempts to detect brute-force attacks.
- Password Policies: Enforces strong passwords through tools like
passwd
and policies for expiration and complexity.
(ii) File Permissions
- Permission Levels:
- Files and directories have three levels of permissions (read, write, execute) for three categories:
- Owner: User who owns the file.
- Group: Users in the file’s group.
- Others: All other users.
- Files and directories have three levels of permissions (read, write, execute) for three categories:
- chmod Command: Modifies permissions using symbolic (e.g.,
chmod u+x
) or numeric (e.g.,chmod 755
) notation. - Special Permissions:
- SUID: Allows a program to run with the owner’s privileges.
- SGID: Grants group-level privileges for executed programs or shared directories.
- Sticky Bit: Restricts file deletion in shared directories.
- Access Control Lists (ACLs): Provide finer-grained control beyond standard permissions.
(iii) Encrypted Storage
- Full-Disk Encryption:
- LUKS (Linux Unified Key Setup) encrypts entire disk partitions.
- Ensures that data is inaccessible without the correct passphrase or key.
- File-Level Encryption:
- Tools like
GPG
encrypt individual files for secure sharing. eCryptfs
offers file-based encryption for secure storage.
- Tools like
- Filesystem-Level Encryption:
- Modern filesystems like ext4 support encryption for directories and files.
- Key Management: Secure handling of encryption keys using tools like
cryptsetup
.
(iv) Remote Access
- SSH (Secure Shell):
- Provides encrypted remote login and command execution.
- Supports key-based authentication for enhanced security.
- Firewall Protection:
- Tools like
iptables
andfirewalld
control access to remote services. - Limits the exposure of sensitive ports.
- Tools like
- VPN (Virtual Private Network):
- Secure remote connectivity using tools like OpenVPN or WireGuard.
- Fail2ban: Detects and blocks brute-force attacks on remote access protocols.
- Auditing: Logs remote access sessions to detect unauthorized activities.