SlideShare a Scribd company logo
Hebron University
College: Information Technology
Department: Security and Protection of Computer Networks
OBJECTIVES
• Background
• Sudo Definition and Syntax.
• Benefits of Sudo.
• Su definition and Syntax.
• Benefits of Su Command.
• What is Visudo?
• How To Give a User Sudo Privileges?
• How To Create Aliases?
SUDOERS
1. Background
FUNDAMENTALS OF NETWORK
ADMINISTRATION
•What is the difference between privilege and
permission .
•Design principles for protection mechanism
requirement .
•diagram a use case with Visual Paradigm
FUNDAMENTALS OF NETWORK
ADMINISTRATION
• A permission is a property of an object, such as a file. It says
which agents are permitted to use the object, and what they
are permitted to do (read it, modify it, etc.).
• A privilege is a property of an agent, such as a user. It lets the
agent do things that are not ordinarily allowed. For example,
there are privileges which allow an agent to access an object
that it does not have permission to access, and privileges
which allow an agent to perform maintenance functions such
as restart the computer.
PROTECTION MECHANISM
REQUIREMENT
• Least Privilege
• Should only have the rights necessary to complete your task.
• Default should be lack of access
• If access needed temporarily, then it should be rescinded right after
use
• Separation of Privilege
• Access to objects should depend on more than one condition being
satisfied
• Separation of duty
• Two person rule
• Isolation of Privilege
DIAGRAM A USE CASE WITH
VISUAL PARADIGM
SUDOERS
2. SUDO Command In Linux
SUDO COMMAND IN LINUX
• The Sudo command is:
the administrator can configure sudo to allow an
ordinary user to execute commands as a different user
(usually the superuser)
• Syntax is :
Sudo <command>
BENEFITS OF SUDO COMMAND IN
LINUX
• Running sudo gives you some benefits – so one hears:
• Using sudo records everything someone does as root.
• Using sudo prevents a user from running continually as
root, preventing errors.
• Using sudo prevents a user from having to know the root
password.
• Using sudo prevents a user from executing anything they
are not permitted to.
SU DEFINITION AND SYNTAX
• Su definition is:
The su command switches to the super user or root
user when you execute it with no additional options.
• Syntax:
Su <option>
BENEFITS OF SU COMMAND .
• Running SU gives you some benefits – so one hears:
• root account’s password may require.
• Switch to any user account .
• Exit is required .
VISUDO COMMAND IN LINUX
• The visudo command:
opens a text editor like normal, but it validates the syntax of the file upon
saving. This prevents configuration errors from blocking sudo operations,
which may be your only way of obtaining root privileges.
Traditionally, visudo opens the /etc/sudoers file with the vi text editor. Ubuntu,
however, has configured visudo to use the nano text editor instead
VISUDO COMMAND IN LINUX (CONT’D)
CHANGE TEXT EDITOR
• The command is :
• sudo update-alternatives --config editor
• The output is :
HOW TO GIVE A USER SUDO PRIVILEGES?
•The list of Commands are:
•sudo usermod -aG sudo <username>
•sudo gpasswd -a <username> sudo
•sudo usermod -aG wheel <username>
•sudo gpasswd -a <username> wheel
HOW TO CREATE ALIASES?
• There are four kinds of aliases:
• User_Alias
• Runas_Alias
• Host_Alias
• Cmnd_Alias
• Each alias definition is of the form:
• Alias_Type NAME = item1, item2, ...
KINDS OF ALIASES
• User Aliases
User aliases are used to specify groups of users. You can specify
usernames, system groups (prefixed by a %) and netgroups (prefixed by
a +) as follows:
KINDS OF ALIASES (CONT’D)
• Runas Aliases
Runas Aliases are almost the same as user aliases but you are allowed to
specify users by uid's. This is helpful as usernames and groups are
matched as strings so two users with the same uid but different
usernames will not be matched by entering a single username but can be
matched with a uid. For example:
KINDS OF ALIASES (CONT’D)
• Host Aliases:
A host alias is a list of hostname, ip addresses, networks and netgroups
(prefixed with a +). If you do not specify a netmask with a network the
netmask of the hosts ethernet interface(s) will be used when matching.
KINDS OF ALIASES (CONT’D)
• Command Aliases:
Command aliases are lists of commands and directories. You can use
this to specify a group of commands. If you specify a directory it will
include any file within that directory but not in any subdirectories.
USER SPECIFICATIONS
• User Specifications:
User Specifications are where the sudoers file sets who can run what as
who. It is the key part of the file and all the aliases have just been set up
for this very point.
• A user specification is in the format
• <user list> <host list> = <operator list> <tag list> <command list>
THE DEFAULT UBUNTU
SUDOERS FILE
REFERENCES
• privilege and permission:
https://www.bayt.com/en/specialties/q/35375/what-is-the-difference-
between-privilege-and-permission-in-computer-security/
• protection mechanism
http://www.cs.ucsb.edu/~kemm/courses/cs177/principles.pdf
• diagram a use case with Visual Paradigm
https://stackoverflow.com/questions/34951366/some-help-diagram-a-use-
case-with-visual-paradigm/34951532#34951532
REFERENCES (CONT’D)
• Sudo Definition and Syntax:
http://wiki.lib.sun.ac.za/images/c/ca/TLCL-13.07.pdf
• What is Visudo?,How To Give a User Sudo Privileges?:
https://www.digitalocean.com/community/tutorials/how-to-edit-the-
sudoers-file-on-ubuntu-and-centos
• Alias:
https://help.ubuntu.com/community/Sudoers
• Benefits of Sudo Command in Linux
https://administratosphere.wordpress.com/2009/04/14/sudo-bane-or-
benefit/
REFERENCES (CONT’D)
• Benefits of Su Command.
https://www.howtogeek.com/111479/htg-explains-whats-the-difference-
between-sudo-su/

More Related Content

What's hot

Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and Permissions
Ahmed El-Arabawy
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
Amazon Web Services
 
User Administration in Linux
User Administration in LinuxUser Administration in Linux
User Administration in Linux
SAMUEL OJO
 
FreeIPA - Attacking the Active Directory of Linux
FreeIPA - Attacking the Active Directory of LinuxFreeIPA - Attacking the Active Directory of Linux
FreeIPA - Attacking the Active Directory of Linux
Julian Catrambone
 
Linux security
Linux securityLinux security
Linux security
trilokchandra prakash
 
Sysinternals utilities : a brief introduction to
Sysinternals utilities : a brief introduction to Sysinternals utilities : a brief introduction to
Sysinternals utilities : a brief introduction to
Akshay koshti
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
FredBrandonAuthorMCP
 
Sticky bit suid sgid
Sticky bit suid sgidSticky bit suid sgid
Sticky bit suid sgid
Madhavendra Dutt
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
Harish R
 
Shell programming
Shell programmingShell programming
Shell programming
Moayad Moawiah
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
thebigredhemi
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Mark Simos
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access ProtocolLDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
S. Hasnain Raza
 
SC-900 Intro
SC-900 IntroSC-900 Intro
SC-900 Intro
FredBrandonAuthorMCP
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBAC
Ajit Dadresa
 
Linux commands
Linux commandsLinux commands
Linux commands
Mannu Khani
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
Shakeel Shafiq
 
Basic 50 linus command
Basic 50 linus commandBasic 50 linus command
Basic 50 linus command
MAGNA COLLEGE OF ENGINEERING
 
Introduction to Shell script
Introduction to Shell scriptIntroduction to Shell script
Introduction to Shell script
Bhavesh Padharia
 
Kali linux os
Kali linux osKali linux os
Kali linux os
Samantha Lawrence
 

What's hot (20)

Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and Permissions
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
User Administration in Linux
User Administration in LinuxUser Administration in Linux
User Administration in Linux
 
FreeIPA - Attacking the Active Directory of Linux
FreeIPA - Attacking the Active Directory of LinuxFreeIPA - Attacking the Active Directory of Linux
FreeIPA - Attacking the Active Directory of Linux
 
Linux security
Linux securityLinux security
Linux security
 
Sysinternals utilities : a brief introduction to
Sysinternals utilities : a brief introduction to Sysinternals utilities : a brief introduction to
Sysinternals utilities : a brief introduction to
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
Sticky bit suid sgid
Sticky bit suid sgidSticky bit suid sgid
Sticky bit suid sgid
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
 
Shell programming
Shell programmingShell programming
Shell programming
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access ProtocolLDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
 
SC-900 Intro
SC-900 IntroSC-900 Intro
SC-900 Intro
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBAC
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Basic 50 linus command
Basic 50 linus commandBasic 50 linus command
Basic 50 linus command
 
Introduction to Shell script
Introduction to Shell scriptIntroduction to Shell script
Introduction to Shell script
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 

Similar to Sudo`

Linux Security
Linux SecurityLinux Security
Linux Security
Mahdi Cherif
 
What’s new in Sudo 1.8?
What’s new in Sudo 1.8?What’s new in Sudo 1.8?
What’s new in Sudo 1.8?
Tyler Reese
 
LinuInterviewQALinuInterviewQALinuInterv
LinuInterviewQALinuInterviewQALinuIntervLinuInterviewQALinuInterviewQALinuInterv
LinuInterviewQALinuInterviewQALinuInterv
AbhishekKumar66407
 
How to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MNHow to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MN
Gene Kartavtsev
 
Presentation for git jira and linux
Presentation for git jira and linuxPresentation for git jira and linux
Presentation for git jira and linux
dkylko1
 
Linux privilege escalation 101
Linux privilege escalation 101Linux privilege escalation 101
Linux privilege escalation 101
Rashid feroz
 
Unix lab manual
Unix lab manualUnix lab manual
Unix lab manual
Tanzeem Syed
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
BeyondTrust
 
Linux
Linux Linux
Kudu and Rust
Kudu and RustKudu and Rust
Kudu and Rust
Dan Burkert
 
Linux commands
Linux commandsLinux commands
Linux commands
Ajaigururaj R
 
Linux commands
Linux commandsLinux commands
Linux commands
Hemakumar.S
 
Linux commands
Linux commandsLinux commands
Linux commands
Hemakumar.S
 
Restricting unix users
Restricting unix usersRestricting unix users
Restricting unix users
Muqthiyar Pasha
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
mandarshetye45
 
Explore Android Internals
Explore Android InternalsExplore Android Internals
Explore Android Internals
National Cheng Kung University
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
OnyemaobiAmarachi
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
OnyemaobiAmarachi
 
Computer operating system and network model
Computer operating system and network modelComputer operating system and network model
Computer operating system and network model
rEjInBhandari
 
Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers
Vignesh kumar
 

Similar to Sudo` (20)

Linux Security
Linux SecurityLinux Security
Linux Security
 
What’s new in Sudo 1.8?
What’s new in Sudo 1.8?What’s new in Sudo 1.8?
What’s new in Sudo 1.8?
 
LinuInterviewQALinuInterviewQALinuInterv
LinuInterviewQALinuInterviewQALinuIntervLinuInterviewQALinuInterviewQALinuInterv
LinuInterviewQALinuInterviewQALinuInterv
 
How to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MNHow to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MN
 
Presentation for git jira and linux
Presentation for git jira and linuxPresentation for git jira and linux
Presentation for git jira and linux
 
Linux privilege escalation 101
Linux privilege escalation 101Linux privilege escalation 101
Linux privilege escalation 101
 
Unix lab manual
Unix lab manualUnix lab manual
Unix lab manual
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
 
Linux
Linux Linux
Linux
 
Kudu and Rust
Kudu and RustKudu and Rust
Kudu and Rust
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Restricting unix users
Restricting unix usersRestricting unix users
Restricting unix users
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Explore Android Internals
Explore Android InternalsExplore Android Internals
Explore Android Internals
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
 
Computer operating system and network model
Computer operating system and network modelComputer operating system and network model
Computer operating system and network model
 
Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers
 

More from abdullah roomi

Swap
SwapSwap
IPsec
IPsecIPsec
Emulation-based SW protection
Emulation-based SW protectionEmulation-based SW protection
Emulation-based SW protection
abdullah roomi
 
Network File System (NFS)
Network File System (NFS)Network File System (NFS)
Network File System (NFS)
abdullah roomi
 
RSS Application Using Dom
RSS Application Using Dom  RSS Application Using Dom
RSS Application Using Dom
abdullah roomi
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
abdullah roomi
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
abdullah roomi
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 
Nginx as a Revers Proxy for Apache on Ubuntu
Nginx as a Revers Proxy for Apache on UbuntuNginx as a Revers Proxy for Apache on Ubuntu
Nginx as a Revers Proxy for Apache on Ubuntu
abdullah roomi
 
it project
it project it project
it project
abdullah roomi
 

More from abdullah roomi (10)

Swap
SwapSwap
Swap
 
IPsec
IPsecIPsec
IPsec
 
Emulation-based SW protection
Emulation-based SW protectionEmulation-based SW protection
Emulation-based SW protection
 
Network File System (NFS)
Network File System (NFS)Network File System (NFS)
Network File System (NFS)
 
RSS Application Using Dom
RSS Application Using Dom  RSS Application Using Dom
RSS Application Using Dom
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Nginx as a Revers Proxy for Apache on Ubuntu
Nginx as a Revers Proxy for Apache on UbuntuNginx as a Revers Proxy for Apache on Ubuntu
Nginx as a Revers Proxy for Apache on Ubuntu
 
it project
it project it project
it project
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Sudo`

  • 1. Hebron University College: Information Technology Department: Security and Protection of Computer Networks
  • 2. OBJECTIVES • Background • Sudo Definition and Syntax. • Benefits of Sudo. • Su definition and Syntax. • Benefits of Su Command. • What is Visudo? • How To Give a User Sudo Privileges? • How To Create Aliases?
  • 4. FUNDAMENTALS OF NETWORK ADMINISTRATION •What is the difference between privilege and permission . •Design principles for protection mechanism requirement . •diagram a use case with Visual Paradigm
  • 5. FUNDAMENTALS OF NETWORK ADMINISTRATION • A permission is a property of an object, such as a file. It says which agents are permitted to use the object, and what they are permitted to do (read it, modify it, etc.). • A privilege is a property of an agent, such as a user. It lets the agent do things that are not ordinarily allowed. For example, there are privileges which allow an agent to access an object that it does not have permission to access, and privileges which allow an agent to perform maintenance functions such as restart the computer.
  • 6. PROTECTION MECHANISM REQUIREMENT • Least Privilege • Should only have the rights necessary to complete your task. • Default should be lack of access • If access needed temporarily, then it should be rescinded right after use • Separation of Privilege • Access to objects should depend on more than one condition being satisfied • Separation of duty • Two person rule • Isolation of Privilege
  • 7. DIAGRAM A USE CASE WITH VISUAL PARADIGM
  • 9. SUDO COMMAND IN LINUX • The Sudo command is: the administrator can configure sudo to allow an ordinary user to execute commands as a different user (usually the superuser) • Syntax is : Sudo <command>
  • 10. BENEFITS OF SUDO COMMAND IN LINUX • Running sudo gives you some benefits – so one hears: • Using sudo records everything someone does as root. • Using sudo prevents a user from running continually as root, preventing errors. • Using sudo prevents a user from having to know the root password. • Using sudo prevents a user from executing anything they are not permitted to.
  • 11. SU DEFINITION AND SYNTAX • Su definition is: The su command switches to the super user or root user when you execute it with no additional options. • Syntax: Su <option>
  • 12. BENEFITS OF SU COMMAND . • Running SU gives you some benefits – so one hears: • root account’s password may require. • Switch to any user account . • Exit is required .
  • 13. VISUDO COMMAND IN LINUX • The visudo command: opens a text editor like normal, but it validates the syntax of the file upon saving. This prevents configuration errors from blocking sudo operations, which may be your only way of obtaining root privileges. Traditionally, visudo opens the /etc/sudoers file with the vi text editor. Ubuntu, however, has configured visudo to use the nano text editor instead
  • 14. VISUDO COMMAND IN LINUX (CONT’D) CHANGE TEXT EDITOR • The command is : • sudo update-alternatives --config editor • The output is :
  • 15. HOW TO GIVE A USER SUDO PRIVILEGES? •The list of Commands are: •sudo usermod -aG sudo <username> •sudo gpasswd -a <username> sudo •sudo usermod -aG wheel <username> •sudo gpasswd -a <username> wheel
  • 16. HOW TO CREATE ALIASES? • There are four kinds of aliases: • User_Alias • Runas_Alias • Host_Alias • Cmnd_Alias • Each alias definition is of the form: • Alias_Type NAME = item1, item2, ...
  • 17. KINDS OF ALIASES • User Aliases User aliases are used to specify groups of users. You can specify usernames, system groups (prefixed by a %) and netgroups (prefixed by a +) as follows:
  • 18. KINDS OF ALIASES (CONT’D) • Runas Aliases Runas Aliases are almost the same as user aliases but you are allowed to specify users by uid's. This is helpful as usernames and groups are matched as strings so two users with the same uid but different usernames will not be matched by entering a single username but can be matched with a uid. For example:
  • 19. KINDS OF ALIASES (CONT’D) • Host Aliases: A host alias is a list of hostname, ip addresses, networks and netgroups (prefixed with a +). If you do not specify a netmask with a network the netmask of the hosts ethernet interface(s) will be used when matching.
  • 20. KINDS OF ALIASES (CONT’D) • Command Aliases: Command aliases are lists of commands and directories. You can use this to specify a group of commands. If you specify a directory it will include any file within that directory but not in any subdirectories.
  • 21. USER SPECIFICATIONS • User Specifications: User Specifications are where the sudoers file sets who can run what as who. It is the key part of the file and all the aliases have just been set up for this very point. • A user specification is in the format • <user list> <host list> = <operator list> <tag list> <command list>
  • 23. REFERENCES • privilege and permission: https://www.bayt.com/en/specialties/q/35375/what-is-the-difference- between-privilege-and-permission-in-computer-security/ • protection mechanism http://www.cs.ucsb.edu/~kemm/courses/cs177/principles.pdf • diagram a use case with Visual Paradigm https://stackoverflow.com/questions/34951366/some-help-diagram-a-use- case-with-visual-paradigm/34951532#34951532
  • 24. REFERENCES (CONT’D) • Sudo Definition and Syntax: http://wiki.lib.sun.ac.za/images/c/ca/TLCL-13.07.pdf • What is Visudo?,How To Give a User Sudo Privileges?: https://www.digitalocean.com/community/tutorials/how-to-edit-the- sudoers-file-on-ubuntu-and-centos • Alias: https://help.ubuntu.com/community/Sudoers • Benefits of Sudo Command in Linux https://administratosphere.wordpress.com/2009/04/14/sudo-bane-or- benefit/
  • 25. REFERENCES (CONT’D) • Benefits of Su Command. https://www.howtogeek.com/111479/htg-explains-whats-the-difference- between-sudo-su/