security strategies in linux platforms and applications lesson 1 security threats to linux

23
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Security Strategies in Linux Platforms and Applications Lesson 1 Security Threats to Linux

Upload: travis

Post on 24-Feb-2016

58 views

Category:

Documents


3 download

DESCRIPTION

Security Strategies in Linux Platforms and Applications Lesson 1 Security Threats to Linux. Learning Objective. Identify threats to the Linux operating system and other open source applications. Key Concepts. Open source software security considerations - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Security Strategies in Linux Platforms and Applications

Lesson 1Security Threats to Linux

Page 2: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 2Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Learning Objective Identify threats to the Linux operating

system and other open source applications.

Page 3: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 3Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Key Concepts Open source software security considerations Impact of laws and regulations on a security

policy Threats to the seven domains of an information

technology (IT) infrastructure Standard methodologies for testing vulnerabilities

on Linux and open source applications Linux in the emerging virtual machine (VM)

market

Page 4: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 4Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: CONCEPTS

Page 5: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 5Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

C-I-A Triad the Parkerian Hexad

Page 6: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 6Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Seven Domains of a Typical IT Infrastructure

Page 7: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 7Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Linux in the Seven Domains

User DomainWorkstation DomainLAN DomainWAN Domain

Page 8: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 8Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Linux in the Seven Domains (Continued)

LAN-to-WAN DomainRemote Access DomainSystem Domain

Page 9: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 9Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Open Source Productivity Applications

Firefox Web browser

OpenOffice.org suite

Thunderbirde-mail client

Scribus desktop

Kino video editor

Page 10: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 10Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: PROCESS

Page 11: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 11Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Defining the Security FrameworkFrameworks to Choose From

National Institute of Standards and Technology (NIST)

Certified Information Systems Security Professional (CISSP) 10 Domains

International Organization for Standardization (ISO) 17799 and ISO 27001

Open Source Security Testing Methodology Manual (OSSTMM)

Key Questions to Consider

What are the critical assets and threat agents?

Who would a system compromise impact?

Where are the critical assets located?

When have past security breaches in the industry occurred?

How does legislation and regulations mandate policy?

Framework Selection

Page 12: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 12Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

OSSTMM Test Methodologies

Page 13: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 13Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: ROLES

Page 14: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 14Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Responsibilities of a Linux System AdministratorSystem availability and performanceUser access and denialMaintenance of the integrity of operating

system, application, storage files, resources, and data transmission

Page 15: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 15Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Tasks of a Linux System AdministratorTuning performance and making upgradesConfiguring and restoring system Managing user and group accountsDeploying, logging, and monitoringDocumenting configurations and processes

Page 16: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 16Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: CONTEXTS

Page 17: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 17Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Linux in the Market: Quick FactsOver 90% of the world’s super computers

run on Linux.The servers of New York Stock Exchange

and Google run on Linux.Red Hat and Novell are the top commercial

Linux vendors for enterprises.Linux is predicted to have a 33%

smartphone share by 2015.

Page 18: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 18Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: RATIONALE

Page 19: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 19Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

VMA VM can be a:

Hardware VM or Hypervisor• Type1—runs on native machines• Type2—runs on host operating systems as

guest Application VM

• Java VM and Dalvik VM• Adobe Flash Player

Page 20: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 20Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Advantages of a Hypervisor

Saves money on hardware and powerWell-positioned for bastion hostsMakes better use of hardware resourcesEasier to manage

Page 21: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 21Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Linux in the VM MarketLinux provides a scalable, robust solution to

scale many servers in a VM environment without the additional licensing costs.

The relative small size of Linux allows for many instances of VMs to run.

The Linux kernel 2.6.20 has virtualization capabilities built-in with Kernel-based VM (KVM).

Page 22: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 22Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

VM Licensing Vendor

VirtualBox Dual open source and commercial

Sun/Oracle

VMware server Commercial VMware

Xen Open source and commercial

Citrix

Popular VM Software Used with Linux

Page 23: Security Strategies in Linux Platforms and Applications Lesson  1 Security Threats to  Linux

Page 23Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Summary Linux in the seven domains and various open

source productivity applications Facts about the use of Linux in the market Responsibilities and tasks of a Linux system

administrator Process to define a security framework Linux in the VM market and various VM

software used with Linux