4.4 UNDERSTAND LINUX SECURITY (4.4.2 DESCRIBE STEPS INVOLVE IN CONFIGURING…
4.4 UNDERSTAND LINUX SECURITY
4.4.3 EXPLAIN FRAMEWORK of PLUG-GABLE AUTHENTICATION MODULE (PAM)
THE PAM FRAMEWORK CONSISTS 4 PARTS:
• The pam.conf(4) configuration file
• PAM library
• PAM consumers
approach enables application developers to use PAM service without having to know the semantics of the policy.
• Provides a uniform way for authentication related activities to take place.
4.4.2 DESCRIBE STEPS INVOLVE IN CONFIGURING UNIX SERVICES
Service rpcbind start
USING NFS TO SHARE FILES
4.4.1 USER and FILE SYSTEM SECURITY ADMINISTRATION
In Linux everything is a file so system security and permission is very important.
Read(r), Write(w) and Execute(x) access
• Permission defined by three types of users
FILE PERMISSION-• Every file or folder in Linux has three types of access permission
Linux users are must less prone to viruses than some other major operating systems, there are still many security issues facing Linux users and administrators.
implement a good security policy on a machine requires a good knowledge of the fundamentals of Linux as well as some of the applications and protocols that are used.
• Security should be one of the foremost thoughts at all stages of setting up your Linux computer.