Q.Β Discuss the security features in LINUX with respect to the following : (i) User Accounts (ii) File Permissions (iii) Encrypted Storage (iv) Remote Access
Security Features in LINUX
(i) User Accounts
- Multi-User Environment: Linux allows multiple user accounts, isolating user data and processes for enhanced security.
- Root Privileges: The superuser (
root) has administrative rights, and access to these rights is tightly controlled. - User Groups: Organizes users into groups, enabling precise access control to files and resources.
- Login Security:
- PAM (Pluggable Authentication Modules) supports customizable authentication mechanisms.
- Tools like
faillogtrack failed login attempts to detect brute-force attacks.
- Password Policies: Enforces strong passwords through tools like
passwdand policies for expiration and complexity.
(ii) File Permissions
- Permission Levels:
- Files and directories have three levels of permissions (read, write, execute) for three categories:
- Owner: User who owns the file.
- Group: Users in the fileβs group.
- Others: All other users.
- Files and directories have three levels of permissions (read, write, execute) for three categories:
- chmod Command: Modifies permissions using symbolic (e.g.,
chmod u+x) or numeric (e.g.,chmod 755) notation. - Special Permissions:
- SUID: Allows a program to run with the ownerβs privileges.
- SGID: Grants group-level privileges for executed programs or shared directories.
- Sticky Bit: Restricts file deletion in shared directories.
- Access Control Lists (ACLs): Provide finer-grained control beyond standard permissions.
(iii) Encrypted Storage
- Full-Disk Encryption:
- LUKS (Linux Unified Key Setup) encrypts entire disk partitions.
- Ensures that data is inaccessible without the correct passphrase or key.
- File-Level Encryption:
- Tools like
GPGencrypt individual files for secure sharing. eCryptfsoffers file-based encryption for secure storage.
- Tools like
- Filesystem-Level Encryption:
- Modern filesystems like ext4 support encryption for directories and files.
- Key Management: Secure handling of encryption keys using tools like
cryptsetup.
(iv) Remote Access
- SSH (Secure Shell):
- Provides encrypted remote login and command execution.
- Supports key-based authentication for enhanced security.
- Firewall Protection:
- Tools like
iptablesandfirewalldcontrol access to remote services. - Limits the exposure of sensitive ports.
- Tools like
- VPN (Virtual Private Network):
- Secure remote connectivity using tools like OpenVPN or WireGuard.
- Fail2ban: Detects and blocks brute-force attacks on remote access protocols.
- Auditing: Logs remote access sessions to detect unauthorized activities.
Comments
Leave a Comment
Your email address will not be published. Required fields are marked *