SlideShare a Scribd company logo
1 of 18
Operating System & Server Security
Presented by
Mohammad Ashfaqur Rahman
Compliance Professional
www.linkedin.com/in/ashfaqsaphal
ashfaq.saphal@gmail.com
Objective
●
Concept of OS security
●
Possible attack on Operating System
●
Hardening Example
●
HW security
OS Security
●
Key functions of an operating
system:
– Computer resource
management
– Provides a user interface
– Runs software utilities and
programs
– Enforce security measures
– Schedules jobs
OS Security
OS Security
●
In-build features
– Authorization and Authentication
– Resource Management
– Response to remote process
Attack !
●
Possible attack and known vulnerability
– Authentication over the network
• Password crack
• Anonymous / Guest login
– Restart / Shutdown machine
– Rootkit placement
– Access to resource
• Activate / deactivate HW component
• Identity theft
Example : User Management
●
80%++ incident are due to insufficient control on user
●
Best practice for user management
– Password policy
• Complexity
• Trivial password management
• Aging
– Account / login locking
• Too many authentication failure
• Rename administrator account (windows)
• Disable guest / nobody etc account
– User group policy
– Minimal file permission
Example : Window
Control Panel → Administrative Tools →
Local Security Setting → Local Policies
→ Security Options
●
Allow CD-ROM / Floppy Access to → localy
autheticated user only
●
Allow to format and Eject Removable
Media to → Administrator only
●
Require strong (windows 2000 or later)
session key
●
Restrict anonymous access to Named Pipes
and shares
●
Disable automatic execution of the
system debugger
●
Disable autoplay for new users by
default
●
Disable Dial-in access to other Server
Example : Window
Control Panel → Administrative Tools →
Services
●
FTP publishing service → Disable
●
Telnet Service → Disable
●
TFTP Service → Disable
●
SMTP → Disable
●
SNMP → Disable
●
SNMP → Disable
// In short disable the services which are
not required
Example : Linux
●
Disable USB
●
rm /lib/modules/2.6.18-
308.24.1.el5/kernel/drivers/usb/sto
rage/usb-storage.ko
●
Password / User data file permission
●
chown root:root passwd shadow group
gshadow
●
chmod 644 passwd group
●
chown root:root passwd shadow group
gshadow
Example : Linux
●
Set Permission to file system file
●
chown root:root /etc/fstab
●
chmod 0644 /etc/fstab
●
Set Umask
●
/etc/sysconfig/init
●
/etc/profile
●
/etc/csh.login
●
/etc/csh.cshrc
●
/etc/bashrc
Example : Linux
●
Set permission of Log files
●
for file in `cat /etc/syslog.conf
| grep -v # | grep var | awk
{'print $2'}`; do chmod 600
$file*;chown root:root $file*; done
●
Restrict remote login of root user
●
/etc/ssh/sshd_config
Example : Linux
●
Disable services that are not required
●
for FILE in chargen chargenudp
cups-lpd cups daytime daytime-udp
echo echo-udp eklogin finger gssftp
imap imaps ipop2 ipop3 krb5-telnet
telnet klogin kshell ktalk ntalk
pop3s rexec rlogin rsh rsync
servers services sgi_fam shell talk
telnet tftp time time-udp vsftpd
wuftpd
●
do
●
chkconfig ${FILE} off
●
done
Example : Linux
●
Enforce password policy
●
/etc/login.def
●
PASS_MAX_DAYS 45
●
PASS_MIN_LEN 8
●
PASS_MIN_DAYS 1
●
Enable password for boot loader (using
/sbin/grub-md5-crypt)
●
/etc/grub.conf
●
password --md5
●
Implement SUDO
●
/etc/sudoers
Example : Linux
●
Set authentication for single user mode
●
/etc/inittab
●
~~:S:wait:/sbin/sulogin
●
Restrict root access by “su”
●
grep ^wheel /etc/group
●
No member should be in “wheel”
group
Hardware Security
●
OS and Physical Security both are required
– OS should prevent malicious code execution
– Physical environment should ensure
• Managing temperature
• Physical Access Control
• Humidity Control
Hardware Security
●
Secure Deployment of hypervisor
– Patching
– Updated Software
●
Updated Firmware
●
Remove default username password
●
Create personal user for administration
●
Enable secure SNMP
●
Disable SNMP Trap
Let's Discuss

More Related Content

Viewers also liked

Dfc2043 operating system; open & closed source systems
Dfc2043 operating system; open & closed source systemsDfc2043 operating system; open & closed source systems
Dfc2043 operating system; open & closed source systemsFlameDimension95
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data SecurityCloudbells.com
 
Social Roles, Technology & Privacy
Social Roles, Technology & PrivacySocial Roles, Technology & Privacy
Social Roles, Technology & PrivacyMathias Klang
 
Regulation by Facebook
Regulation by FacebookRegulation by Facebook
Regulation by FacebookMathias Klang
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24jemtallon
 
CISSP - TELECOM apresentada no CNASI 2013
CISSP - TELECOM apresentada no CNASI 2013CISSP - TELECOM apresentada no CNASI 2013
CISSP - TELECOM apresentada no CNASI 2013Adilson Da Rocha
 
Apresentando o Windows Server 2008 R2
Apresentando o Windows Server 2008 R2Apresentando o Windows Server 2008 R2
Apresentando o Windows Server 2008 R2Rodrigo Immaginario
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26jemtallon
 
DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...
DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...
DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...Cláudio Dodt
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22jemtallon
 
Operating Systems A-Z
Operating Systems A-ZOperating Systems A-Z
Operating Systems A-ZRavinJ
 
My first Operating System Presentation
My first Operating System PresentationMy first Operating System Presentation
My first Operating System PresentationRida Bilgrami
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7jemtallon
 
Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]Zulhilmi Shaffe
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating SystemsSinbad Konick
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4FRSecure
 

Viewers also liked (20)

Dfc2043 operating system; open & closed source systems
Dfc2043 operating system; open & closed source systemsDfc2043 operating system; open & closed source systems
Dfc2043 operating system; open & closed source systems
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data Security
 
Social Roles, Technology & Privacy
Social Roles, Technology & PrivacySocial Roles, Technology & Privacy
Social Roles, Technology & Privacy
 
Regulation by Facebook
Regulation by FacebookRegulation by Facebook
Regulation by Facebook
 
Pruebas de Intrusión utilizando Open Source
Pruebas de Intrusión utilizando Open SourcePruebas de Intrusión utilizando Open Source
Pruebas de Intrusión utilizando Open Source
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
 
CISSP - TELECOM apresentada no CNASI 2013
CISSP - TELECOM apresentada no CNASI 2013CISSP - TELECOM apresentada no CNASI 2013
CISSP - TELECOM apresentada no CNASI 2013
 
Apresentando o Windows Server 2008 R2
Apresentando o Windows Server 2008 R2Apresentando o Windows Server 2008 R2
Apresentando o Windows Server 2008 R2
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
 
FOSS & Society
FOSS & SocietyFOSS & Society
FOSS & Society
 
DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...
DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...
DARYUS Inovação com Segurança da Informação: Desafios de uma gestão flexível ...
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22
 
Operating Systems A-Z
Operating Systems A-ZOperating Systems A-Z
Operating Systems A-Z
 
Owasp presentacion latam tour (Ago 2011)
Owasp presentacion latam tour (Ago 2011)Owasp presentacion latam tour (Ago 2011)
Owasp presentacion latam tour (Ago 2011)
 
Owasp Top10 FireFox
Owasp Top10 FireFoxOwasp Top10 FireFox
Owasp Top10 FireFox
 
My first Operating System Presentation
My first Operating System PresentationMy first Operating System Presentation
My first Operating System Presentation
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
 
Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]Open Source Operating System [Chapter 1]
Open Source Operating System [Chapter 1]
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating Systems
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
 

Similar to 006.itsecurity bcp v1

Using filesystem capabilities with rsync
Using filesystem capabilities with rsyncUsing filesystem capabilities with rsync
Using filesystem capabilities with rsyncHazel Smith
 
Linux security quick reference guide
Linux security quick reference guideLinux security quick reference guide
Linux security quick reference guideCraig Cannon
 
Resource Monitoring and management
Resource Monitoring and management  Resource Monitoring and management
Resource Monitoring and management Duressa Teshome
 
7 unixsecurity
7 unixsecurity7 unixsecurity
7 unixsecurityricharddxd
 
[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answers[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answersOWASP
 
We shall play a game....
We shall play a game....We shall play a game....
We shall play a game....Sadia Textile
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX SecurityHelpSystems
 
No locked doors, no windows barred: hacking OpenAM infrastructure
No locked doors, no windows barred: hacking OpenAM infrastructureNo locked doors, no windows barred: hacking OpenAM infrastructure
No locked doors, no windows barred: hacking OpenAM infrastructureAndrew Petukhov
 
Turbo charge your logs
Turbo charge your logsTurbo charge your logs
Turbo charge your logsJeremy Cook
 
User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015Netgate
 
Shall we play a game
Shall we play a gameShall we play a game
Shall we play a gamejackpot201
 

Similar to 006.itsecurity bcp v1 (20)

Using filesystem capabilities with rsync
Using filesystem capabilities with rsyncUsing filesystem capabilities with rsync
Using filesystem capabilities with rsync
 
Linux security quick reference guide
Linux security quick reference guideLinux security quick reference guide
Linux security quick reference guide
 
An Introduction To Linux
An Introduction To LinuxAn Introduction To Linux
An Introduction To Linux
 
Resource Monitoring and management
Resource Monitoring and management  Resource Monitoring and management
Resource Monitoring and management
 
7 unixsecurity
7 unixsecurity7 unixsecurity
7 unixsecurity
 
[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answers[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Application security - daily questions & answers
 
Adhocr T-dose 2012
Adhocr T-dose 2012Adhocr T-dose 2012
Adhocr T-dose 2012
 
Download It
Download ItDownload It
Download It
 
Drupal Security Hardening
Drupal Security HardeningDrupal Security Hardening
Drupal Security Hardening
 
Drupal Security Hardening
Drupal Security HardeningDrupal Security Hardening
Drupal Security Hardening
 
Linux Hardening - Made Easy
Linux Hardening - Made EasyLinux Hardening - Made Easy
Linux Hardening - Made Easy
 
Syslog.ppt
Syslog.pptSyslog.ppt
Syslog.ppt
 
We shall play a game....
We shall play a game....We shall play a game....
We shall play a game....
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX Security
 
No locked doors, no windows barred: hacking OpenAM infrastructure
No locked doors, no windows barred: hacking OpenAM infrastructureNo locked doors, no windows barred: hacking OpenAM infrastructure
No locked doors, no windows barred: hacking OpenAM infrastructure
 
Turbo charge your logs
Turbo charge your logsTurbo charge your logs
Turbo charge your logs
 
User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015
 
0507 057 01 98 * Adana Klima Servisleri
0507 057 01 98 * Adana Klima Servisleri0507 057 01 98 * Adana Klima Servisleri
0507 057 01 98 * Adana Klima Servisleri
 
Shall we play a game
Shall we play a gameShall we play a game
Shall we play a game
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 

More from Mohammad Ashfaqur Rahman

Cyber Security Considerations for 4IR in Bangladesh
Cyber Security Considerations for 4IR in BangladeshCyber Security Considerations for 4IR in Bangladesh
Cyber Security Considerations for 4IR in BangladeshMohammad Ashfaqur Rahman
 
Cyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) developmentCyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) developmentMohammad Ashfaqur Rahman
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19Mohammad Ashfaqur Rahman
 
Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Mohammad Ashfaqur Rahman
 

More from Mohammad Ashfaqur Rahman (20)

Cyber Security Considerations for 4IR in Bangladesh
Cyber Security Considerations for 4IR in BangladeshCyber Security Considerations for 4IR in Bangladesh
Cyber Security Considerations for 4IR in Bangladesh
 
Cyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) developmentCyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) development
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19
 
Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 1 of 2Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 1 of 2
 
Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
 
007.itsecurity bcp v1
007.itsecurity bcp v1007.itsecurity bcp v1
007.itsecurity bcp v1
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
000.itsecurity bcp v1
000.itsecurity bcp v1000.itsecurity bcp v1
000.itsecurity bcp v1
 
Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
 
010.safetymanagement v3
010.safetymanagement v3010.safetymanagement v3
010.safetymanagement v3
 
010.safetymanagement v3
010.safetymanagement v3010.safetymanagement v3
010.safetymanagement v3
 
009.safetymanagement v3
009.safetymanagement v3009.safetymanagement v3
009.safetymanagement v3
 

Recently uploaded

Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 

Recently uploaded (20)

Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

006.itsecurity bcp v1

  • 1. Operating System & Server Security Presented by Mohammad Ashfaqur Rahman Compliance Professional www.linkedin.com/in/ashfaqsaphal ashfaq.saphal@gmail.com
  • 2. Objective ● Concept of OS security ● Possible attack on Operating System ● Hardening Example ● HW security
  • 3. OS Security ● Key functions of an operating system: – Computer resource management – Provides a user interface – Runs software utilities and programs – Enforce security measures – Schedules jobs
  • 5. OS Security ● In-build features – Authorization and Authentication – Resource Management – Response to remote process
  • 6. Attack ! ● Possible attack and known vulnerability – Authentication over the network • Password crack • Anonymous / Guest login – Restart / Shutdown machine – Rootkit placement – Access to resource • Activate / deactivate HW component • Identity theft
  • 7. Example : User Management ● 80%++ incident are due to insufficient control on user ● Best practice for user management – Password policy • Complexity • Trivial password management • Aging – Account / login locking • Too many authentication failure • Rename administrator account (windows) • Disable guest / nobody etc account – User group policy – Minimal file permission
  • 8. Example : Window Control Panel → Administrative Tools → Local Security Setting → Local Policies → Security Options ● Allow CD-ROM / Floppy Access to → localy autheticated user only ● Allow to format and Eject Removable Media to → Administrator only ● Require strong (windows 2000 or later) session key ● Restrict anonymous access to Named Pipes and shares ● Disable automatic execution of the system debugger ● Disable autoplay for new users by default ● Disable Dial-in access to other Server
  • 9. Example : Window Control Panel → Administrative Tools → Services ● FTP publishing service → Disable ● Telnet Service → Disable ● TFTP Service → Disable ● SMTP → Disable ● SNMP → Disable ● SNMP → Disable // In short disable the services which are not required
  • 10. Example : Linux ● Disable USB ● rm /lib/modules/2.6.18- 308.24.1.el5/kernel/drivers/usb/sto rage/usb-storage.ko ● Password / User data file permission ● chown root:root passwd shadow group gshadow ● chmod 644 passwd group ● chown root:root passwd shadow group gshadow
  • 11. Example : Linux ● Set Permission to file system file ● chown root:root /etc/fstab ● chmod 0644 /etc/fstab ● Set Umask ● /etc/sysconfig/init ● /etc/profile ● /etc/csh.login ● /etc/csh.cshrc ● /etc/bashrc
  • 12. Example : Linux ● Set permission of Log files ● for file in `cat /etc/syslog.conf | grep -v # | grep var | awk {'print $2'}`; do chmod 600 $file*;chown root:root $file*; done ● Restrict remote login of root user ● /etc/ssh/sshd_config
  • 13. Example : Linux ● Disable services that are not required ● for FILE in chargen chargenudp cups-lpd cups daytime daytime-udp echo echo-udp eklogin finger gssftp imap imaps ipop2 ipop3 krb5-telnet telnet klogin kshell ktalk ntalk pop3s rexec rlogin rsh rsync servers services sgi_fam shell talk telnet tftp time time-udp vsftpd wuftpd ● do ● chkconfig ${FILE} off ● done
  • 14. Example : Linux ● Enforce password policy ● /etc/login.def ● PASS_MAX_DAYS 45 ● PASS_MIN_LEN 8 ● PASS_MIN_DAYS 1 ● Enable password for boot loader (using /sbin/grub-md5-crypt) ● /etc/grub.conf ● password --md5 ● Implement SUDO ● /etc/sudoers
  • 15. Example : Linux ● Set authentication for single user mode ● /etc/inittab ● ~~:S:wait:/sbin/sulogin ● Restrict root access by “su” ● grep ^wheel /etc/group ● No member should be in “wheel” group
  • 16. Hardware Security ● OS and Physical Security both are required – OS should prevent malicious code execution – Physical environment should ensure • Managing temperature • Physical Access Control • Humidity Control
  • 17. Hardware Security ● Secure Deployment of hypervisor – Patching – Updated Software ● Updated Firmware ● Remove default username password ● Create personal user for administration ● Enable secure SNMP ● Disable SNMP Trap