Wednesday, January 28, 2009

UNIT 7 – LINUX OPERATING SYSTEM VULNERABILITIES

Textbook: Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson Course Technology, 2006.

Reading:
Textbook – Chapter 9, pp. 195–227

Assignments:
Review Questions (RQ):
Chapter 9, pp. 228–230

Hard Drives Required for LAB.

Lab(s):
LAB 1: LINUX PROGRAMMING
Refer to emailed handout.

LAB 2: FINDING LINUX ROOTKITS ON THE INTERNET
Perform activity 9-6, Chapter 9, pp.215 of your text book. After completing the activity, answer the following questions:
1. What can be the impact of rooting the commands that you listed?
2. If you visit the Web site http://www.securityfocus.com/infocus/1539, it demonstrates several tasks that you can do to harden Linux against attacks. Which of these can help prevent rootkit installs?

Evaluation Criteria:
1. Did the students recognize that the rooting of many of these commands gives up monitoring and control of their system?
2. Were the students able to relate the rooting with the methods that could have prevented the rooting of the system?

Deliverables and format: Assignment due at the end of class.
Submit your answer in a Microsoft Word document.
Font: Arial; 11
Line Spacing: Double

Graded Research Assignment 1 (RA1)
Title: Securing Linux Server against Unauthorized Intrusion
Introduction: Whether it is a Linux server or Microsoft server, within its defined role, it is essential to secure that resource. It is important to understand how the server roles relate to the methods that help secure these devices. This assignment will assist you in making those connections. Visit the URL http://www.aboutdebian.com/security.htm, and read about network security in Linux server. Next, in a Word document:

1. Describe the four types of Linux servers.
2. Describe the broad security categories according to Debian.
3. For each security category, list two techniques that can assist in securing a Linux system and why you think that technique is of assistance.

Evaluation Criteria:
1. Did the student describe four types of servers:
a. Application Servers
b. File Servers
c. Network Security Servers
d. Firewall servers and Web servers
2. Did the student describe the four categories of security?
3. Did the student list two techniques for each security category and explained how these techniques can help?

Deliverables and format: Assignment due at the end of class.
Submit your answer in a Microsoft Word document.
Font: Arial; 11
Line Spacing: Double
Submit each assignment type as a separate attachment (CA1, LABs, RQ)


Refer to General Course Information for Email and Assignment Instructions.