This report provides insights into system security issues and solutions for Ubuntu 18.04. It covers the installation of VMware, investigation of system security, obtained results, and proposal for system security. The report aims to evaluate and address different security angles and issues.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Computer Security Student Name: Student ID: Date of Submission:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents 1.Project Overview and Aim............................................................................................................1 2.Installation of VMware..................................................................................................................1 3.Investigation of the System Security.............................................................................................6 4.Obtained Results..........................................................................................................................11 5.Proposal: System Security for Ubuntu 18.04...............................................................................13 References...........................................................................................................................................15
1.Project Overview and Aim In this era of technology, system security is highly essential. System security issues can occur due to various reasons. The following report aims to reveal the insight behind these reasons and solution for the issues. The basic things to understand the context of this report requires understanding the Virtual Machine (VM), which is defined as an impression of a PC or desktop that relies upon the computer engineering and gives the physical Computer's functionality (Bento et al., 2019). VMware Workstation helps the users to enable and install Virtual OS on a single physical machine, and simultaneously utilize them with the original machine.In an enterprise, if the desktops are managed using the VMware View, it benefits by increasing the security, reliability, provides hardware independence, and increases the convenience too. It provides restrictions to access the data and the sensitive data could be protected from being copied onto a remote employee's home computer. The context of this report depends on two firms and they are: 1)Widgets Inc. and 2)Benny Vandergast Inc. Widgets Inc. facilitates with virtual machine images, though Benny Vandergast Inc. has given a VMware to try for security reasons and it is expected to be utilized for the new web- based electronic store. The general view point of this report is security evaluation for the given VM images. In this way, different security angles will be assessed and tried, to observe different security issues. The assessment is suggested to be completed with the help of some exceptional security assessment tools.In Security evaluation, the VM image files will be evaluated with the following sections: Investigation of the System security. Usage and applying the system security tool. Obtaining the results. Proposal for system security. 2.Installation of VMware This section presents the installation of VMware. Thesteps required to install the VMware includes: 1
1.From a Portal, download the VM image file. 2.Install the VMware work station. 3.Finally, open it. The following figures depicts the installation steps. After opening the VMware,the provided VM file must be browsedand opened. 2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Simultaneously, open Ubuntu as shown in the below figure. 3
When the VM Ubuntu completes installing, login using the user name and password, here the user login id is user and the password is Password.These credentials are hacked by: i.Recovering from booting mode. ii.Dropping the rooting of shell prompt. iii.Remounting the root with write access. iv.Resetting the user login id and password. v.Authentication manipulation error when a new password is entered by the user. 4
It is common to get error messages as the file system is mounted using “read access only.” The file system can be modified and remounted. Then, it must resetthe password and using the new password when the user tries to login, it will have to face the following security issues on the Ubuntu VM: i.Problems of encrypt data communication. ii.Problems of opening the SSL. iii.Network services problems on the VM instance. iv.Problems of malware. v.Problems of Web server hardening vi.Security patches vii.Problems of Password setting. viii.Problems of data backup. 3.Investigation of the System Security A system’s security evaluation process is investigated in this section where a given virtual machine image file is used, this area reveals the insights of the evaluation of VM. The assessment of security is used to lookat a system to choose the system compliance based on particular aspects like security norms, and model. It is viewing the system's behaviour by attempting to enter the system. In Ubuntu 18.04, the given VM image file, security evaluation is done based on the global standard to get the computer security affirmation. It is basically a certificate thatshows the met satisfactions. The specification of security requirementsare used to show the security targets to be met. The security assessment is used to do changes in the configuration and utilizes the additional packages (Eka Pratama and Wiradarma, 2018). Next, it checks the configuration manual to unveil how to set-up the evaluated configuration, to give the necessary information to the administrator and user. Security evaluation utilizes full disk encryption to increase the data affirmation in a system. It empowers the users to encryption and guarantee data assurance. It additionally completes the 5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
software updating on Ubuntu 18.04. Hence, it is highly essential to assess the system security as it helps to avoid the vulnerabilities. The following figures show how to harden the system with the assistance of Ubuntu OS. Practice setting strong passwords The security passwords work for the security of all the devices from various external threats. The installation allows the system to harden where a User account is made. It is critical to have a strong and verified password that is hard to find by the hackers. In addition, the created account has a place with the Administrative group thus it is essential to be create a safe password (Kali Linux – Assuring Security by Penetration Testing, 2014). Perform disk encryption Security is associated with encryption just as protection. Encryption is a propelled technique which encourages the clients to amplify the security and protection of the OS. The outer attacks are the dynamic power that dependably changes. Accordingly, there are fewer shots that the security system can generally ensure assurance, thus this builds the need to verify the system from outside attacks where the information is likewise verified. In Ubuntu, it is important to have an unscrambling key. However, it is a tiring procedure, Ubuntu encryption is a straightforward technique which benefits each component of the OS. The utilization of this technique expands the complexities to break the information that is put away independent of any compelling decoding software. 6
Ensure Automatic Security Updating The Linux server must guarantee to require some serious energy and threats on refreshing the software and system. It is exceedingly noteworthy update as the Linux Distributions in particular Ubuntu gives every day refreshes and on a long haul hole of updates can be a danger to the clients and their system. Clearly, it is tiring errand to day by day take a shot at the updates and more often than not it very well may be overlooked, along these lines, the answer for this to choose the choice, automatically installing the security updates. This alternative guarantees to consequently deal with the regularupdates 7
Update the Software The system software shows an automatic method, which the user selects. Irrespective of the fact that there exists a manual alternative for updating the software, but the users prefers to select an automatic or the auto option. Hardening the Web server The procedure of Web Server Hardening improves the security of a server with various ways that outcomes in profoundly verified server working foundation. The reason is propelledsecurityestimateswhichareutilizedwhentheserverhardeningprocess happens.The Secure Sockets Layer (SSL) and the TLS indicates a standard method that verifies the web connection and protects the sensitive information which must be shared between a couple or more systems, at that point, it keeps the programmers from changing the exchanged information and an individual’s personal details. In a Linux system, SSL and TLS must be streamlined with the assistance of server hardening and deals withsystem security and systemspeed. Selecting Certificates from the recognized Sources Get certification from specialized and reputable servicesfor online security. Optimizing TLS Handshake Utilizationof"three-way"handshakeguaranteestoutilizethetypicalTCP connection,, for setting up a safe connection. Enabling the Persistent Connections In a single connection, numerous requests can be made with a persistent connection. The new SSL connection is required when an individual wish to visit a site that is secure when contrasted with multiple times in the only a couple of minutes. Utilization of a diligent connection, only for a single time then it can start the SSL connection that evacuates the required extra additional handshakes. Use of CDN The websites influence CDNs to propel its page load speed. This aide in sending and makes the CDN advance the SSL/TLS displays. Guarantee to manage the mutual estimates thatarerecordedintheearlierentryidentifiedwithTLShandshakeandindustrious connection foundation. Using the latest SSL form similarly as TLS which must be sought after reliably. The reason for utilizing new forms are the insufficient old adaptations, which are uncommonly defenceless against the viruses and bugs. There must be an ability to 8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
perceive certain viewpoints regarding what is the requirement, for instance, the general system or the Security System's execution for the server. Typical and consistent tests drove on the approved websites for SSL/TLS must be driven. Guarantee to perceive the parts that require Performance when contrasted with security and correspondingly check where security is fundamental than execution. Use the inbuilt development tools, for example, system security audit in the Linux System. User Accounts The Ubuntu Single Sign-On account can be used to approve the desktop applications. The production of accounts can be used to access the server. This is basic for the system administration. The clients absent much pressure can access the servers while using the system openly by the SCP (Secure Copy) and SSH. The Secure Copy implies the command line tool that is used to recreate or trade the files starting with one host then onto the next host. It uses a similar security system, like SSH program. Risks ofUser Account Any system in spite of being verified and solid it by and large needs rebooting. Regardless, we have found that there are a couple of systems that continually run and work relentlessly. Additionally, the investigated system ends up being helpless against the threats that were recently settled inside a system either local or the outside threats. The actualuser must know about the downsides to understand the issues. Here, the activity of system hardening is basic and critical. Every system is prescribed to lead system hardening, which can slaughter such defaults and issues that happen in any system (greghub.com, 2019). Open SSH security and System Hardening InaLinuxsystem,toguaranteesystemadministrationtheSSHisprescribed convention as it is critical for server management. Most of the Linux based systems have this convention and run based on this. The default setting alludes to the unaltered configuration. The Linux System hardening is a standout amongst the best way to deal with decrease the potentialsystemattacks.Consequenttomodifyingtheconfigurationdocumentitis fundamental to test the legitimacy before the administration is reloaded. Then, constantly check the SSH's status before the sending. What's more, frequently a well-recorded way to deal with arrangement with the system check supports to make things simple. The SSH configuration test guarantees and perceive the system Functioning and Non-Functioning. Encrypting all the traffic gives extra security from the network sniffing and diverse attacks. Also, it is accessible in various stages. Similarly, it is conceivable to execute the SSH port 9
sending to give information security. The SSH server is commonly used to help server authentication. It is sheltered yet we can regardless complete a couple of changes for cutting edge security. It suits the security stages like Ubuntu Security, where the system is protected from any potential attacks.The following are the main features which are essential for setting up the SSH security: a)Utilize different port other than 22 (i.e., the default port) b)Disable the direct root login. c)Only use the Protocol SSH 2. d)Utilize public keys in place of passwords. e)Use of X11 forwarding f)Disable the empty passwords. g)Enable two-factor authentication. h)Use strong passwords and passphrase for SSH users/keys i)Disable port forwarding j)Configure an Idle Timeout Interval. k)Make any required changes to the remote system. l)Restrict the SSH logins to a particular IP address. Ubuntu's system security starts with software hardening and after that the other connected applications. Ubuntu's system security begins with system software hardening and after that, the related applications pursued by the used fundamental software. The best arrangement is to implement day by day and on-time filters with vital updates for the system, which keeps its working viable. For SSH security, the fundamental tool incorporates Lynis software. It is an audit tool which does testing and from Unix-based systems, it accumulates security information. It is anything but difficult to utilize and gives the security answers rapidly, to take immediate steps. 4.Obtained Results Coming up next are the outcomes received from the examination by utilizing a system security tool. On Ubuntu 18.04, Lynis auditing tool is utilized to perform system security. It is an open source security audit tool, which is beneficial in assessing the security of a VM system. Based on these highlights, this tool was chosen for the Linux Platform. It is advantageous for the security experts and system admins to check the system for any security 10
resistances, and this results in system hardening. The perception of this evaluation is that Ubuntu fits well for this system (Boelen, 2019). Installation of the Security auditing tool-Lynis To install Lynis, the source code is utilized. Thus, the required file is downloaded and afterwards the binary is copied to the system. Likewise, it is possible with the assistance of the package manager.Hence, it isn’t difficult to install Lyris tool/software. For Ubuntu 18.04, Lynis is installed by using the following command (Rajput, 2019): Sudo apt-get installs lynis The output looks as in the following figure. 11
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
As Lynis software's installation completes, it begins auditing the Security status. It even offers suggestions that demonstrate to you how you can approach system hardening by yourself and how to recognize the system weaknesses. 12
Lynis scans the system and when it is done it facilitates the user with a report which helps to decide the outcomes, hardening list and location of the connected files.The Lynis is used to distinguish the accompanying information with respect to system security as follows- The vulnerabilities identification and investigation; System security improvements; various compliance tests; Administrative management; and Security audits.For the investigated system,Lynissoftware proposes help to build security level of its server. It gets the suggestion, which contains Suggestion ID, suggestion brief and appropriate solution.On the other hand, the warnings are shared too. Lynis directs to do various individual tests to identify the exclusive reasons and weakness of the investigated system. It demonstrates the outcomes in a report which shows the suggestion along with security improvements for the system. 5.Proposal: System Security for Ubuntu 18.04 The system security proposal is presented in this section of the report. It aims to clarify how a system can be verified, and how to distinguish the security issues. In the investigated system the recognized security issues are- Pacemaker Vulnerabilities, PHP vulnerabilities, System weakness, Libxslt weakness, and Wget vulnerabilities. Among such huge number of identified issues, it is obligatory to develop a solution. The below mentioned viewpoints are taken as consideration to verifying the system’s security: 1.The System should be Up-to-date on a scheduled basis A system should be kept updated every now and then by the user. 2.Less user accounts It is recommended to continuouslyutilize less user accounts (Müller and Schuppan, 2013). 13
3.A network that encounters issues should be evacuated. A network encounters issues identified with the services that should be segregated or disposed of from the system. This affirms systemimprovement in terms of system and entire network’s performance. Also, this coordinates towards less conceivable outcomes for security threats. The accompanying procedure can be applied- Identification of the services that are running; identification of services that must be disposed and uninstallation of listening services. 4.Discarding the unused Network confronting Services Fundamentally, the network confronting servicesarenot needed for the system should be discarded, which helps in lessening the attacks in the packages and in the running processes. It includes the following procedures-Identify the running services, identify the services to be removed and uninstall the listening services (Schamburek, 2013). 5.Configure firewall To or from a private network, the prevention access that is unauthorized is upheld by the firewall. It very well may be utilized as a mix of both hardware and software, or exclusively for securing the unauthorized traffic and web access.It stops pointless inbound traffic and offers the system with a system security layer. It verifies the network mapping and interruptions. The following points portray the firewall applications that are widely utilized: 1.The Layer 7 is secured with the use of Imperva's cloud-based web application firewall, since it contains the features to secure the web applications from a wide range of attacks in the application-layer, for instance, OWASP Top 10. 2.It is supportive in identifying the application layer’ threats, zero-day vulnerabilities and OWASP Top 10. 6.HardeningSSH Access To build system connection, password authentication is the commonly used approach that requires SSH, as it uses a cryptographic key pair and because of its high level security. Though, the private key of SSH uses the password that is effective in brute force attacks. The Harden SSH access contains, a)Authentication key pair should be created. b)The alternatives of SSH Daemon is used to prohibitthe root logins over SSH. At the same time, SSH password authentication will be disabled. c)To protectSSH login, the Fail 2 Ban is used. 14
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
d)To have safe SSH, the incredibly advantageous technique must be utilized, where thelogindependsonpublicandprivatekey.Itisavailablein SSH/OpenSSH/Keys. e)The password authentication is the most effective method tosecure SSH, for disabling the root login.Likewise, it assists to change the SSH port from a standard port 22 to some other port. f)It is important to make another SSH user before disabling the root login. g)Next, take care of the user who is a part of the administrative group. Henceforth, it is determined that Ubuntu is very much secure OS. References Bento, A., Silva, E., Galdino, M. and Júnior, J. (2019). An Experiment with DDoS Attack on NodeMCU12e Devices for IoT with T50 Kali Linux.International Journal of Advanced Engineering Research and Science, 6(1), pp.18-24. Eka Pratama, I. and Wiradarma, A. (2018). IMPLEMENTASI KATOOLIN SEBAGAI PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS: REVERSE ENGINEERING FILE .APK).Jurnal RESISTOR (Rekayasa Sistem Komputer), 1(2), pp.86-93. Kali Linux – Assuring Security by Penetration Testing. (2014).Network Security, 2014(8), p.4. Müller, H. and Schuppan, T. (2013). Bericht vom Dialogforum in Potsdam.VM, pp.107- 112. Schamburek, D. (2013). Stellenwert-Indikatoren für Politikfelder in der Aufbauorganisation von Ministerialverwaltungen.VM, pp.210-219. 15