Please enable JavaScript.
Coggle requires JavaScript to display documents.
4.4 UNDERSTAND LINUX SECURITY (4.4.2 DESCRIBE STEPS INVOLVE IN CONFIGURING…
4.4 UNDERSTAND LINUX SECURITY
• Security should be one of the foremost thoughts at all stages of setting up your Linux computer.
implement a good security policy on a machine requires a good knowledge of the fundamentals of Linux as well as some of the applications and protocols that are used.
Linux users are must less prone to viruses than some other major operating systems, there are still many security issues facing Linux users and administrators.
4.4.1 USER and FILE SYSTEM SECURITY ADMINISTRATION
FILE PERMISSION-• Every file or folder in Linux has three types of access permission
Read(r), Write(w) and Execute(x) access
• Permission defined by three types of users
In Linux everything is a file so system security and permission is very important.
4.4.2 DESCRIBE STEPS INVOLVE IN CONFIGURING UNIX SERVICES
USING NFS TO SHARE FILES
INSTALLING NFS
CONFIGURING NFS
Mkdir /public
Touch /public/nfs1/public/nfs2/public/nfs3
Service rpcbind start
4.4.3 EXPLAIN FRAMEWORK of PLUG-GABLE AUTHENTICATION MODULE (PAM)
• Provides a uniform way for authentication related activities to take place.
approach enables application developers to use PAM service without having to know the semantics of the policy.
THE PAM FRAMEWORK CONSISTS 4 PARTS:
• PAM consumers
• PAM library
• The pam.conf(4) configuration file