System Security for Ubuntu 18.04
VerifiedAdded on 2022/12/23
|17
|3603
|52
AI Summary
This report provides insights into system security issues and solutions for Ubuntu 18.04. It covers the installation of VMware, investigation of system security, obtained results, and proposal for system security. The report aims to evaluate and address different security angles and issues.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Computer Security
Student Name:
Student ID:
Date of Submission:
Student Name:
Student ID:
Date of Submission:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
1. Project Overview and Aim............................................................................................................1
2. Installation of VMware..................................................................................................................1
3. Investigation of the System Security.............................................................................................6
4. Obtained Results..........................................................................................................................11
5. Proposal: System Security for Ubuntu 18.04...............................................................................13
References...........................................................................................................................................15
1. Project Overview and Aim............................................................................................................1
2. Installation of VMware..................................................................................................................1
3. Investigation of the System Security.............................................................................................6
4. Obtained Results..........................................................................................................................11
5. Proposal: System Security for Ubuntu 18.04...............................................................................13
References...........................................................................................................................................15
1. Project Overview and Aim
In this era of technology, system security is highly essential. System security issues can
occur due to various reasons. The following report aims to reveal the insight behind these
reasons and solution for the issues. The basic things to understand the context of this report
requires understanding the Virtual Machine (VM), which is defined as an impression of a PC
or desktop that relies upon the computer engineering and gives the physical Computer's
functionality (Bento et al., 2019).
VMware Workstation helps the users to enable and install Virtual OS on a single
physical machine, and simultaneously utilize them with the original machine.In an enterprise,
if the desktops are managed using the VMware View, it benefits by increasing the security,
reliability, provides hardware independence, and increases the convenience too. It provides
restrictions to access the data and the sensitive data could be protected from being copied
onto a remote employee's home computer.
The context of this report depends on two firms and they are:
1) Widgets Inc. and
2) Benny Vandergast Inc.
Widgets Inc. facilitates with virtual machine images, though Benny Vandergast Inc. has
given a VMware to try for security reasons and it is expected to be utilized for the new web-
based electronic store.
The general view point of this report is security evaluation for the given VM images. In
this way, different security angles will be assessed and tried, to observe different security
issues. The assessment is suggested to be completed with the help of some exceptional
security assessment tools.In Security evaluation, the VM image files will be evaluated with
the following sections:
Investigation of the System security.
Usage and applying the system security tool.
Obtaining the results.
Proposal for system security.
2. Installation of VMware
This section presents the installation of VMware.
Thesteps required to install the VMware includes:
1
In this era of technology, system security is highly essential. System security issues can
occur due to various reasons. The following report aims to reveal the insight behind these
reasons and solution for the issues. The basic things to understand the context of this report
requires understanding the Virtual Machine (VM), which is defined as an impression of a PC
or desktop that relies upon the computer engineering and gives the physical Computer's
functionality (Bento et al., 2019).
VMware Workstation helps the users to enable and install Virtual OS on a single
physical machine, and simultaneously utilize them with the original machine.In an enterprise,
if the desktops are managed using the VMware View, it benefits by increasing the security,
reliability, provides hardware independence, and increases the convenience too. It provides
restrictions to access the data and the sensitive data could be protected from being copied
onto a remote employee's home computer.
The context of this report depends on two firms and they are:
1) Widgets Inc. and
2) Benny Vandergast Inc.
Widgets Inc. facilitates with virtual machine images, though Benny Vandergast Inc. has
given a VMware to try for security reasons and it is expected to be utilized for the new web-
based electronic store.
The general view point of this report is security evaluation for the given VM images. In
this way, different security angles will be assessed and tried, to observe different security
issues. The assessment is suggested to be completed with the help of some exceptional
security assessment tools.In Security evaluation, the VM image files will be evaluated with
the following sections:
Investigation of the System security.
Usage and applying the system security tool.
Obtaining the results.
Proposal for system security.
2. Installation of VMware
This section presents the installation of VMware.
Thesteps required to install the VMware includes:
1
1. From a Portal, download the VM image file.
2. Install the VMware work station.
3. Finally, open it.
The following figures depicts the installation steps.
After opening the VMware,the provided VM file must be browsedand opened.
2
2. Install the VMware work station.
3. Finally, open it.
The following figures depicts the installation steps.
After opening the VMware,the provided VM file must be browsedand opened.
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Simultaneously, open Ubuntu as shown in the below figure.
3
3
When the VM Ubuntu completes installing, login using the user name and password, here the
user login id is user and the password is Password.These credentials are hacked by:
i. Recovering from booting mode.
ii. Dropping the rooting of shell prompt.
iii. Remounting the root with write access.
iv. Resetting the user login id and password.
v. Authentication manipulation error when a new password is entered by the user.
4
user login id is user and the password is Password.These credentials are hacked by:
i. Recovering from booting mode.
ii. Dropping the rooting of shell prompt.
iii. Remounting the root with write access.
iv. Resetting the user login id and password.
v. Authentication manipulation error when a new password is entered by the user.
4
It is common to get error messages as the file system is mounted using “read access
only.” The file system can be modified and remounted. Then, it must resetthe password and
using the new password when the user tries to login, it will have to face the following
security issues on the Ubuntu VM:
i. Problems of encrypt data communication.
ii. Problems of opening the SSL.
iii. Network services problems on the VM instance.
iv. Problems of malware.
v. Problems of Web server hardening
vi. Security patches
vii. Problems of Password setting.
viii. Problems of data backup.
3. Investigation of the System Security
A system’s security evaluation process is investigated in this section where a given
virtual machine image file is used, this area reveals the insights of the evaluation of VM. The
assessment of security is used to lookat a system to choose the system compliance based on
particular aspects like security norms, and model. It is viewing the system's behaviour by
attempting to enter the system. In Ubuntu 18.04, the given VM image file, security evaluation
is done based on the global standard to get the computer security affirmation. It is basically a
certificate thatshows the met satisfactions. The specification of security requirementsare used
to show the security targets to be met. The security assessment is used to do changes in the
configuration and utilizes the additional packages (Eka Pratama and Wiradarma, 2018).
Next, it checks the configuration manual to unveil how to set-up the evaluated
configuration, to give the necessary information to the administrator and user. Security
evaluation utilizes full disk encryption to increase the data affirmation in a system. It
empowers the users to encryption and guarantee data assurance. It additionally completes the
5
only.” The file system can be modified and remounted. Then, it must resetthe password and
using the new password when the user tries to login, it will have to face the following
security issues on the Ubuntu VM:
i. Problems of encrypt data communication.
ii. Problems of opening the SSL.
iii. Network services problems on the VM instance.
iv. Problems of malware.
v. Problems of Web server hardening
vi. Security patches
vii. Problems of Password setting.
viii. Problems of data backup.
3. Investigation of the System Security
A system’s security evaluation process is investigated in this section where a given
virtual machine image file is used, this area reveals the insights of the evaluation of VM. The
assessment of security is used to lookat a system to choose the system compliance based on
particular aspects like security norms, and model. It is viewing the system's behaviour by
attempting to enter the system. In Ubuntu 18.04, the given VM image file, security evaluation
is done based on the global standard to get the computer security affirmation. It is basically a
certificate thatshows the met satisfactions. The specification of security requirementsare used
to show the security targets to be met. The security assessment is used to do changes in the
configuration and utilizes the additional packages (Eka Pratama and Wiradarma, 2018).
Next, it checks the configuration manual to unveil how to set-up the evaluated
configuration, to give the necessary information to the administrator and user. Security
evaluation utilizes full disk encryption to increase the data affirmation in a system. It
empowers the users to encryption and guarantee data assurance. It additionally completes the
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
software updating on Ubuntu 18.04. Hence, it is highly essential to assess the system security
as it helps to avoid the vulnerabilities.
The following figures show how to harden the system with the assistance of Ubuntu
OS.
Practice setting strong passwords
The security passwords work for the security of all the devices from various external
threats. The installation allows the system to harden where a User account is made. It is
critical to have a strong and verified password that is hard to find by the hackers. In addition,
the created account has a place with the Administrative group thus it is essential to be create a
safe password (Kali Linux – Assuring Security by Penetration Testing, 2014).
Perform disk encryption
Security is associated with encryption just as protection. Encryption is a propelled
technique which encourages the clients to amplify the security and protection of the OS. The
outer attacks are the dynamic power that dependably changes. Accordingly, there are fewer
shots that the security system can generally ensure assurance, thus this builds the need to
verify the system from outside attacks where the information is likewise verified. In Ubuntu,
it is important to have an unscrambling key. However, it is a tiring procedure, Ubuntu
encryption is a straightforward technique which benefits each component of the OS. The
utilization of this technique expands the complexities to break the information that is put
away independent of any compelling decoding software.
6
as it helps to avoid the vulnerabilities.
The following figures show how to harden the system with the assistance of Ubuntu
OS.
Practice setting strong passwords
The security passwords work for the security of all the devices from various external
threats. The installation allows the system to harden where a User account is made. It is
critical to have a strong and verified password that is hard to find by the hackers. In addition,
the created account has a place with the Administrative group thus it is essential to be create a
safe password (Kali Linux – Assuring Security by Penetration Testing, 2014).
Perform disk encryption
Security is associated with encryption just as protection. Encryption is a propelled
technique which encourages the clients to amplify the security and protection of the OS. The
outer attacks are the dynamic power that dependably changes. Accordingly, there are fewer
shots that the security system can generally ensure assurance, thus this builds the need to
verify the system from outside attacks where the information is likewise verified. In Ubuntu,
it is important to have an unscrambling key. However, it is a tiring procedure, Ubuntu
encryption is a straightforward technique which benefits each component of the OS. The
utilization of this technique expands the complexities to break the information that is put
away independent of any compelling decoding software.
6
Ensure Automatic Security Updating
The Linux server must guarantee to require some serious energy and threats on
refreshing the software and system. It is exceedingly noteworthy update as the Linux
Distributions in particular Ubuntu gives every day refreshes and on a long haul hole of
updates can be a danger to the clients and their system. Clearly, it is tiring errand to day by
day take a shot at the updates and more often than not it very well may be overlooked, along
these lines, the answer for this to choose the choice, automatically installing the security
updates. This alternative guarantees to consequently deal with the regularupdates
7
The Linux server must guarantee to require some serious energy and threats on
refreshing the software and system. It is exceedingly noteworthy update as the Linux
Distributions in particular Ubuntu gives every day refreshes and on a long haul hole of
updates can be a danger to the clients and their system. Clearly, it is tiring errand to day by
day take a shot at the updates and more often than not it very well may be overlooked, along
these lines, the answer for this to choose the choice, automatically installing the security
updates. This alternative guarantees to consequently deal with the regularupdates
7
Update the Software
The system software shows an automatic method, which the user selects. Irrespective
of the fact that there exists a manual alternative for updating the software, but the users
prefers to select an automatic or the auto option.
Hardening the Web server
The procedure of Web Server Hardening improves the security of a server with
various ways that outcomes in profoundly verified server working foundation. The reason is
propelled security estimates which are utilized when the server hardening process
happens.The Secure Sockets Layer (SSL) and the TLS indicates a standard method that
verifies the web connection and protects the sensitive information which must be shared
between a couple or more systems, at that point, it keeps the programmers from changing the
exchanged information and an individual’s personal details. In a Linux system, SSL and TLS
must be streamlined with the assistance of server hardening and deals withsystem security
and systemspeed.
Selecting Certificates from the recognized Sources
Get certification from specialized and reputable servicesfor online security.
Optimizing TLS Handshake
Utilization of "three-way" handshake guarantees to utilize the typical TCP
connection,, for setting up a safe connection.
Enabling the Persistent Connections
In a single connection, numerous requests can be made with a persistent
connection. The new SSL connection is required when an individual wish to
visit a site that is secure when contrasted with multiple times in the only a
couple of minutes. Utilization of a diligent connection, only for a single time
then it can start the SSL connection that evacuates the required extra additional
handshakes.
Use of CDN
The websites influence CDNs to propel its page load speed. This aide in sending and
makes the CDN advance the SSL/TLS displays. Guarantee to manage the mutual estimates
that are recorded in the earlier entry identified with TLS handshake and industrious
connection foundation. Using the latest SSL form similarly as TLS which must be sought
after reliably. The reason for utilizing new forms are the insufficient old adaptations, which
are uncommonly defenceless against the viruses and bugs. There must be an ability to
8
The system software shows an automatic method, which the user selects. Irrespective
of the fact that there exists a manual alternative for updating the software, but the users
prefers to select an automatic or the auto option.
Hardening the Web server
The procedure of Web Server Hardening improves the security of a server with
various ways that outcomes in profoundly verified server working foundation. The reason is
propelled security estimates which are utilized when the server hardening process
happens.The Secure Sockets Layer (SSL) and the TLS indicates a standard method that
verifies the web connection and protects the sensitive information which must be shared
between a couple or more systems, at that point, it keeps the programmers from changing the
exchanged information and an individual’s personal details. In a Linux system, SSL and TLS
must be streamlined with the assistance of server hardening and deals withsystem security
and systemspeed.
Selecting Certificates from the recognized Sources
Get certification from specialized and reputable servicesfor online security.
Optimizing TLS Handshake
Utilization of "three-way" handshake guarantees to utilize the typical TCP
connection,, for setting up a safe connection.
Enabling the Persistent Connections
In a single connection, numerous requests can be made with a persistent
connection. The new SSL connection is required when an individual wish to
visit a site that is secure when contrasted with multiple times in the only a
couple of minutes. Utilization of a diligent connection, only for a single time
then it can start the SSL connection that evacuates the required extra additional
handshakes.
Use of CDN
The websites influence CDNs to propel its page load speed. This aide in sending and
makes the CDN advance the SSL/TLS displays. Guarantee to manage the mutual estimates
that are recorded in the earlier entry identified with TLS handshake and industrious
connection foundation. Using the latest SSL form similarly as TLS which must be sought
after reliably. The reason for utilizing new forms are the insufficient old adaptations, which
are uncommonly defenceless against the viruses and bugs. There must be an ability to
8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
perceive certain viewpoints regarding what is the requirement, for instance, the general
system or the Security System's execution for the server. Typical and consistent tests drove
on the approved websites for SSL/TLS must be driven. Guarantee to perceive the parts that
require Performance when contrasted with security and correspondingly check where security
is fundamental than execution. Use the inbuilt development tools, for example, system
security audit in the Linux System.
User Accounts
The Ubuntu Single Sign-On account can be used to approve the desktop applications.
The production of accounts can be used to access the server. This is basic for the system
administration. The clients absent much pressure can access the servers while using the
system openly by the SCP (Secure Copy) and SSH. The Secure Copy implies the command
line tool that is used to recreate or trade the files starting with one host then onto the next
host. It uses a similar security system, like SSH program.
Risks ofUser Account
Any system in spite of being verified and solid it by and large needs rebooting. Regardless,
we have found that there are a couple of systems that continually run and work relentlessly.
Additionally, the investigated system ends up being helpless against the threats that were
recently settled inside a system either local or the outside threats. The actualuser must know
about the downsides to understand the issues. Here, the activity of system hardening is basic
and critical. Every system is prescribed to lead system hardening, which can slaughter such
defaults and issues that happen in any system (greghub.com, 2019).
Open SSH security and System Hardening
In a Linux system, to guarantee system administration the SSH is prescribed
convention as it is critical for server management. Most of the Linux based systems have this
convention and run based on this. The default setting alludes to the unaltered configuration.
The Linux System hardening is a standout amongst the best way to deal with decrease the
potential system attacks. Consequent to modifying the configuration document it is
fundamental to test the legitimacy before the administration is reloaded. Then, constantly
check the SSH's status before the sending. What's more, frequently a well-recorded way to
deal with arrangement with the system check supports to make things simple. The SSH
configuration test guarantees and perceive the system Functioning and Non-Functioning.
Encrypting all the traffic gives extra security from the network sniffing and diverse attacks.
Also, it is accessible in various stages. Similarly, it is conceivable to execute the SSH port
9
system or the Security System's execution for the server. Typical and consistent tests drove
on the approved websites for SSL/TLS must be driven. Guarantee to perceive the parts that
require Performance when contrasted with security and correspondingly check where security
is fundamental than execution. Use the inbuilt development tools, for example, system
security audit in the Linux System.
User Accounts
The Ubuntu Single Sign-On account can be used to approve the desktop applications.
The production of accounts can be used to access the server. This is basic for the system
administration. The clients absent much pressure can access the servers while using the
system openly by the SCP (Secure Copy) and SSH. The Secure Copy implies the command
line tool that is used to recreate or trade the files starting with one host then onto the next
host. It uses a similar security system, like SSH program.
Risks ofUser Account
Any system in spite of being verified and solid it by and large needs rebooting. Regardless,
we have found that there are a couple of systems that continually run and work relentlessly.
Additionally, the investigated system ends up being helpless against the threats that were
recently settled inside a system either local or the outside threats. The actualuser must know
about the downsides to understand the issues. Here, the activity of system hardening is basic
and critical. Every system is prescribed to lead system hardening, which can slaughter such
defaults and issues that happen in any system (greghub.com, 2019).
Open SSH security and System Hardening
In a Linux system, to guarantee system administration the SSH is prescribed
convention as it is critical for server management. Most of the Linux based systems have this
convention and run based on this. The default setting alludes to the unaltered configuration.
The Linux System hardening is a standout amongst the best way to deal with decrease the
potential system attacks. Consequent to modifying the configuration document it is
fundamental to test the legitimacy before the administration is reloaded. Then, constantly
check the SSH's status before the sending. What's more, frequently a well-recorded way to
deal with arrangement with the system check supports to make things simple. The SSH
configuration test guarantees and perceive the system Functioning and Non-Functioning.
Encrypting all the traffic gives extra security from the network sniffing and diverse attacks.
Also, it is accessible in various stages. Similarly, it is conceivable to execute the SSH port
9
sending to give information security. The SSH server is commonly used to help server
authentication. It is sheltered yet we can regardless complete a couple of changes for cutting
edge security. It suits the security stages like Ubuntu Security, where the system is protected
from any potential attacks.The following are the main features which are essential for setting
up the SSH security:
a) Utilize different port other than 22 (i.e., the default port)
b) Disable the direct root login.
c) Only use the Protocol SSH 2.
d) Utilize public keys in place of passwords.
e) Use of X11 forwarding
f) Disable the empty passwords.
g) Enable two-factor authentication.
h) Use strong passwords and passphrase for SSH users/keys
i) Disable port forwarding
j) Configure an Idle Timeout Interval.
k) Make any required changes to the remote system.
l) Restrict the SSH logins to a particular IP address.
Ubuntu's system security starts with software hardening and after that the other
connected applications. Ubuntu's system security begins with system software hardening and
after that, the related applications pursued by the used fundamental software. The best
arrangement is to implement day by day and on-time filters with vital updates for the system,
which keeps its working viable. For SSH security, the fundamental tool incorporates Lynis
software. It is an audit tool which does testing and from Unix-based systems, it accumulates
security information. It is anything but difficult to utilize and gives the security answers
rapidly, to take immediate steps.
4. Obtained Results
Coming up next are the outcomes received from the examination by utilizing a system
security tool. On Ubuntu 18.04, Lynis auditing tool is utilized to perform system security. It
is an open source security audit tool, which is beneficial in assessing the security of a VM
system. Based on these highlights, this tool was chosen for the Linux Platform. It is
advantageous for the security experts and system admins to check the system for any security
10
authentication. It is sheltered yet we can regardless complete a couple of changes for cutting
edge security. It suits the security stages like Ubuntu Security, where the system is protected
from any potential attacks.The following are the main features which are essential for setting
up the SSH security:
a) Utilize different port other than 22 (i.e., the default port)
b) Disable the direct root login.
c) Only use the Protocol SSH 2.
d) Utilize public keys in place of passwords.
e) Use of X11 forwarding
f) Disable the empty passwords.
g) Enable two-factor authentication.
h) Use strong passwords and passphrase for SSH users/keys
i) Disable port forwarding
j) Configure an Idle Timeout Interval.
k) Make any required changes to the remote system.
l) Restrict the SSH logins to a particular IP address.
Ubuntu's system security starts with software hardening and after that the other
connected applications. Ubuntu's system security begins with system software hardening and
after that, the related applications pursued by the used fundamental software. The best
arrangement is to implement day by day and on-time filters with vital updates for the system,
which keeps its working viable. For SSH security, the fundamental tool incorporates Lynis
software. It is an audit tool which does testing and from Unix-based systems, it accumulates
security information. It is anything but difficult to utilize and gives the security answers
rapidly, to take immediate steps.
4. Obtained Results
Coming up next are the outcomes received from the examination by utilizing a system
security tool. On Ubuntu 18.04, Lynis auditing tool is utilized to perform system security. It
is an open source security audit tool, which is beneficial in assessing the security of a VM
system. Based on these highlights, this tool was chosen for the Linux Platform. It is
advantageous for the security experts and system admins to check the system for any security
10
resistances, and this results in system hardening. The perception of this evaluation is that
Ubuntu fits well for this system (Boelen, 2019).
Installation of the Security auditing tool-Lynis
To install Lynis, the source code is utilized. Thus, the required file is downloaded and
afterwards the binary is copied to the system. Likewise, it is possible with the assistance of
the package manager.Hence, it isn’t difficult to install Lyris tool/software. For Ubuntu 18.04,
Lynis is installed by using the following command (Rajput, 2019):
Sudo apt-get installs lynis
The output looks as in the following figure.
11
Ubuntu fits well for this system (Boelen, 2019).
Installation of the Security auditing tool-Lynis
To install Lynis, the source code is utilized. Thus, the required file is downloaded and
afterwards the binary is copied to the system. Likewise, it is possible with the assistance of
the package manager.Hence, it isn’t difficult to install Lyris tool/software. For Ubuntu 18.04,
Lynis is installed by using the following command (Rajput, 2019):
Sudo apt-get installs lynis
The output looks as in the following figure.
11
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
As Lynis software's installation completes, it begins auditing the Security status. It even offers
suggestions that demonstrate to you how you can approach system hardening by yourself and how to
recognize the system weaknesses.
12
suggestions that demonstrate to you how you can approach system hardening by yourself and how to
recognize the system weaknesses.
12
Lynis scans the system and when it is done it facilitates the user with a report which
helps to decide the outcomes, hardening list and location of the connected files.The Lynis is
used to distinguish the accompanying information with respect to system security as follows-
The vulnerabilities identification and investigation; System security improvements; various
compliance tests; Administrative management; and Security audits.For the investigated
system,Lynis software proposes help to build security level of its server. It gets the
suggestion, which contains Suggestion ID, suggestion brief and appropriate solution.On the
other hand, the warnings are shared too. Lynis directs to do various individual tests to
identify the exclusive reasons and weakness of the investigated system. It demonstrates the
outcomes in a report which shows the suggestion along with security improvements for the
system.
5. Proposal: System Security for Ubuntu 18.04
The system security proposal is presented in this section of the report. It aims to
clarify how a system can be verified, and how to distinguish the security issues. In the
investigated system the recognized security issues are- Pacemaker Vulnerabilities, PHP
vulnerabilities, System weakness, Libxslt weakness, and Wget vulnerabilities.
Among such huge number of identified issues, it is obligatory to develop a solution. The below
mentioned viewpoints are taken as consideration to verifying the system’s security:
1. The System should be Up-to-date on a scheduled basis
A system should be kept updated every now and then by the user.
2. Less user accounts
It is recommended to continuouslyutilize less user accounts (Müller and Schuppan, 2013).
13
helps to decide the outcomes, hardening list and location of the connected files.The Lynis is
used to distinguish the accompanying information with respect to system security as follows-
The vulnerabilities identification and investigation; System security improvements; various
compliance tests; Administrative management; and Security audits.For the investigated
system,Lynis software proposes help to build security level of its server. It gets the
suggestion, which contains Suggestion ID, suggestion brief and appropriate solution.On the
other hand, the warnings are shared too. Lynis directs to do various individual tests to
identify the exclusive reasons and weakness of the investigated system. It demonstrates the
outcomes in a report which shows the suggestion along with security improvements for the
system.
5. Proposal: System Security for Ubuntu 18.04
The system security proposal is presented in this section of the report. It aims to
clarify how a system can be verified, and how to distinguish the security issues. In the
investigated system the recognized security issues are- Pacemaker Vulnerabilities, PHP
vulnerabilities, System weakness, Libxslt weakness, and Wget vulnerabilities.
Among such huge number of identified issues, it is obligatory to develop a solution. The below
mentioned viewpoints are taken as consideration to verifying the system’s security:
1. The System should be Up-to-date on a scheduled basis
A system should be kept updated every now and then by the user.
2. Less user accounts
It is recommended to continuouslyutilize less user accounts (Müller and Schuppan, 2013).
13
3. A network that encounters issues should be evacuated.
A network encounters issues identified with the services that should be segregated or disposed
of from the system. This affirms systemimprovement in terms of system and entire network’s
performance. Also, this coordinates towards less conceivable outcomes for security threats. The
accompanying procedure can be applied- Identification of the services that are running; identification
of services that must be disposed and uninstallation of listening services.
4. Discarding the unused Network confronting Services
Fundamentally, the network confronting servicesarenot needed for the system should be
discarded, which helps in lessening the attacks in the packages and in the running processes. It
includes the following procedures- Identify the running services, identify the services to be
removed and uninstall the listening services (Schamburek, 2013).
5. Configure firewall
To or from a private network, the prevention access that is unauthorized is upheld by
the firewall. It very well may be utilized as a mix of both hardware and software, or
exclusively for securing the unauthorized traffic and web access.It stops pointless inbound
traffic and offers the system with a system security layer. It verifies the network mapping and
interruptions. The following points portray the firewall applications that are widely utilized:
1. The Layer 7 is secured with the use of Imperva's cloud-based web application
firewall, since it contains the features to secure the web applications from a wide
range of attacks in the application-layer, for instance, OWASP Top 10.
2. It is supportive in identifying the application layer’ threats, zero-day vulnerabilities
and OWASP Top 10.
6. Hardening SSH Access
To build system connection, password authentication is the commonly used approach
that requires SSH, as it uses a cryptographic key pair and because of its high level security.
Though, the private key of SSH uses the password that is effective in brute force attacks. The
Harden SSH access contains,
a) Authentication key pair should be created.
b) The alternatives of SSH Daemon is used to prohibitthe root logins over SSH. At
the same time, SSH password authentication will be disabled.
c) To protectSSH login, the Fail 2 Ban is used.
14
A network encounters issues identified with the services that should be segregated or disposed
of from the system. This affirms systemimprovement in terms of system and entire network’s
performance. Also, this coordinates towards less conceivable outcomes for security threats. The
accompanying procedure can be applied- Identification of the services that are running; identification
of services that must be disposed and uninstallation of listening services.
4. Discarding the unused Network confronting Services
Fundamentally, the network confronting servicesarenot needed for the system should be
discarded, which helps in lessening the attacks in the packages and in the running processes. It
includes the following procedures- Identify the running services, identify the services to be
removed and uninstall the listening services (Schamburek, 2013).
5. Configure firewall
To or from a private network, the prevention access that is unauthorized is upheld by
the firewall. It very well may be utilized as a mix of both hardware and software, or
exclusively for securing the unauthorized traffic and web access.It stops pointless inbound
traffic and offers the system with a system security layer. It verifies the network mapping and
interruptions. The following points portray the firewall applications that are widely utilized:
1. The Layer 7 is secured with the use of Imperva's cloud-based web application
firewall, since it contains the features to secure the web applications from a wide
range of attacks in the application-layer, for instance, OWASP Top 10.
2. It is supportive in identifying the application layer’ threats, zero-day vulnerabilities
and OWASP Top 10.
6. Hardening SSH Access
To build system connection, password authentication is the commonly used approach
that requires SSH, as it uses a cryptographic key pair and because of its high level security.
Though, the private key of SSH uses the password that is effective in brute force attacks. The
Harden SSH access contains,
a) Authentication key pair should be created.
b) The alternatives of SSH Daemon is used to prohibitthe root logins over SSH. At
the same time, SSH password authentication will be disabled.
c) To protectSSH login, the Fail 2 Ban is used.
14
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
d) To have safe SSH, the incredibly advantageous technique must be utilized, where
the login depends on public and private key. It is available in
SSH/OpenSSH/Keys.
e) The password authentication is the most effective method tosecure SSH, for
disabling the root login.Likewise, it assists to change the SSH port from a
standard port 22 to some other port.
f) It is important to make another SSH user before disabling the root login.
g) Next, take care of the user who is a part of the administrative group.
Henceforth, it is determined that Ubuntu is very much secure OS.
References
Bento, A., Silva, E., Galdino, M. and Júnior, J. (2019). An Experiment with DDoS
Attack on NodeMCU12e Devices for IoT with T50 Kali Linux. International Journal of
Advanced Engineering Research and Science, 6(1), pp.18-24.
Eka Pratama, I. and Wiradarma, A. (2018). IMPLEMENTASI KATOOLIN SEBAGAI
PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS:
REVERSE ENGINEERING FILE .APK). Jurnal RESISTOR (Rekayasa Sistem
Komputer), 1(2), pp.86-93.
Kali Linux – Assuring Security by Penetration Testing. (2014). Network Security,
2014(8), p.4.
Müller, H. and Schuppan, T. (2013). Bericht vom Dialogforum in Potsdam. VM, pp.107-
112.
Schamburek, D. (2013). Stellenwert-Indikatoren für Politikfelder in der
Aufbauorganisation von Ministerialverwaltungen. VM, pp.210-219.
15
the login depends on public and private key. It is available in
SSH/OpenSSH/Keys.
e) The password authentication is the most effective method tosecure SSH, for
disabling the root login.Likewise, it assists to change the SSH port from a
standard port 22 to some other port.
f) It is important to make another SSH user before disabling the root login.
g) Next, take care of the user who is a part of the administrative group.
Henceforth, it is determined that Ubuntu is very much secure OS.
References
Bento, A., Silva, E., Galdino, M. and Júnior, J. (2019). An Experiment with DDoS
Attack on NodeMCU12e Devices for IoT with T50 Kali Linux. International Journal of
Advanced Engineering Research and Science, 6(1), pp.18-24.
Eka Pratama, I. and Wiradarma, A. (2018). IMPLEMENTASI KATOOLIN SEBAGAI
PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS:
REVERSE ENGINEERING FILE .APK). Jurnal RESISTOR (Rekayasa Sistem
Komputer), 1(2), pp.86-93.
Kali Linux – Assuring Security by Penetration Testing. (2014). Network Security,
2014(8), p.4.
Müller, H. and Schuppan, T. (2013). Bericht vom Dialogforum in Potsdam. VM, pp.107-
112.
Schamburek, D. (2013). Stellenwert-Indikatoren für Politikfelder in der
Aufbauorganisation von Ministerialverwaltungen. VM, pp.210-219.
15
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.