Cybersecurity and Linux Web Server
VerifiedAdded on 2023/01/12
|8
|1965
|82
AI Summary
This documentation focuses on cybersecurity and the use of Linux web server for data protection. It discusses mobile device vulnerabilities, security protection techniques, ensuring web server availability, and using Linux server auditing tools. It also provides recommendations to minimize employee risk.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Individual project
1
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................9
2
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................9
2
INTRODUCTION
The documentation is based on the set of cybersecurity that is always help for
organization to prevent company from other unauthorized access. It is helping for maintaining
security and privacy of system effectively and efficiently. The report is mainly focused on the
Linux web server which consider as most effective and efficient way to protect data. The
assignment will consider on the MBC TV broadcasting organization that allows their staff
member to use own computing services. It will describe about the two security protection
technique for mobile phone and ensure that availability of web service by using Linux server.
Furthermore, it will discuss about different Linux server auditing tools for purpose of analyzing
and monitoring the webserver, email server problem.
TASK 1
Identify that how mobile devices vulnerable to abuse and destruction.
There are various type of mobile threats that is directly effects on the entire processing of
mobile phone. It mainly involves virus, malicious, spyware, worms that can inflect hardware
devices (Brilingaitė, Bukauskas and Kutka, 2019). But some threats against mobile phones are
highly dangerous because it can be destructive and abusive. In this way, various threat can make
mobile device vulnerable to abuse and destruction.
Malicious application threat (Malware): It is the kind of malicious code and harmful for
mobile device because it is designed to create system vulnerabilities. Sometimes, it may
not be blocked by using antivirus software. Malicious threat intend to do harm which is
mainly used by hackers (Chetty and Alathur, 2019). They can cause and vary by various
intent they have. The malware threat can either steal sensitive information of organization
in mobile phone without realizing the person. The application make device vulnerable
due to malware.
Web based threat: This type of threat is mainly targeting the mobile device if a person
visits the website. Initially, it is completely looking fine but actually person install
malicious code in mobile system. Furthermore, it directly target the entire processing
system. In this way, Fake website intend for distribution. This type of threat can destroy
of personal information within mobile device.
3
The documentation is based on the set of cybersecurity that is always help for
organization to prevent company from other unauthorized access. It is helping for maintaining
security and privacy of system effectively and efficiently. The report is mainly focused on the
Linux web server which consider as most effective and efficient way to protect data. The
assignment will consider on the MBC TV broadcasting organization that allows their staff
member to use own computing services. It will describe about the two security protection
technique for mobile phone and ensure that availability of web service by using Linux server.
Furthermore, it will discuss about different Linux server auditing tools for purpose of analyzing
and monitoring the webserver, email server problem.
TASK 1
Identify that how mobile devices vulnerable to abuse and destruction.
There are various type of mobile threats that is directly effects on the entire processing of
mobile phone. It mainly involves virus, malicious, spyware, worms that can inflect hardware
devices (Brilingaitė, Bukauskas and Kutka, 2019). But some threats against mobile phones are
highly dangerous because it can be destructive and abusive. In this way, various threat can make
mobile device vulnerable to abuse and destruction.
Malicious application threat (Malware): It is the kind of malicious code and harmful for
mobile device because it is designed to create system vulnerabilities. Sometimes, it may
not be blocked by using antivirus software. Malicious threat intend to do harm which is
mainly used by hackers (Chetty and Alathur, 2019). They can cause and vary by various
intent they have. The malware threat can either steal sensitive information of organization
in mobile phone without realizing the person. The application make device vulnerable
due to malware.
Web based threat: This type of threat is mainly targeting the mobile device if a person
visits the website. Initially, it is completely looking fine but actually person install
malicious code in mobile system. Furthermore, it directly target the entire processing
system. In this way, Fake website intend for distribution. This type of threat can destroy
of personal information within mobile device.
3
Two types of security protection technique and how it can mitigate threats.
Security protection technique is based on the process that performed the various
prevention task to eliminate threat within mobile device (Douglas, Harris and Dragiewicz, 2019).
The technique is basically used for mobile device in order to control or mitigate threat while
providing protection from against malware. There are two types of security protecting technique
that can be used for mobile phone devices.
Installation of encryption technique: It is one of the most common technique that is
mainly used in mobile devices. Encrypting technique provide the security in the mobile
phone which help for making data or information unreadable. If mobile device is hacked,
stolen whereas it has chances to loss all sensitive data (Korać, Damjanović and Simić,
2020). At that time this encryption technique will support to protect information from
unauthorized users because data must be encrypted in the coding format. In order to
mitigate threats and control unauthorized access. It is not easier to directly access
information. User need to install feature within device to encrypt data in proper manner.
Install antivirus application: there are various type of application consists of malicious
code, if once install malicious code within mobile device, it can send information to
unauthorized person, hackers which increasing the possibilities of threat. In this way,
antivirus application support to eliminate threat when it occurred from mobile device. In
order to maintain the privacy and security through threat (Wiryawan and et.al., 2019).
The antivirus technique that provide better functionalities such as erase data if mobile
device lost, tracking and blocking unknown callers. In this way, it mitigate the threats and
eliminate in mobile devices.
Organization can ensure the availability of web server by using Linux web server.
MBC firm is mainly used the Apache webserver on Linux which always supporting the
web pages that required by hardware system present within organization. So as require for
company to configure Linux as a root sever. In order to perform various task and check
availability of web-browser (Wixey, Johnson and De Cristofaro, 2020). The organization need to
visit the website and hosted with the help of Apache web server. Afterwards, it has been
developed the connection from local host whereas firm identify the connection between website
on Linux web server in proper manner. In some situation, it will require to enter address of URL
and perform the significant tasks or ensure the availability the webserver.
4
Security protection technique is based on the process that performed the various
prevention task to eliminate threat within mobile device (Douglas, Harris and Dragiewicz, 2019).
The technique is basically used for mobile device in order to control or mitigate threat while
providing protection from against malware. There are two types of security protecting technique
that can be used for mobile phone devices.
Installation of encryption technique: It is one of the most common technique that is
mainly used in mobile devices. Encrypting technique provide the security in the mobile
phone which help for making data or information unreadable. If mobile device is hacked,
stolen whereas it has chances to loss all sensitive data (Korać, Damjanović and Simić,
2020). At that time this encryption technique will support to protect information from
unauthorized users because data must be encrypted in the coding format. In order to
mitigate threats and control unauthorized access. It is not easier to directly access
information. User need to install feature within device to encrypt data in proper manner.
Install antivirus application: there are various type of application consists of malicious
code, if once install malicious code within mobile device, it can send information to
unauthorized person, hackers which increasing the possibilities of threat. In this way,
antivirus application support to eliminate threat when it occurred from mobile device. In
order to maintain the privacy and security through threat (Wiryawan and et.al., 2019).
The antivirus technique that provide better functionalities such as erase data if mobile
device lost, tracking and blocking unknown callers. In this way, it mitigate the threats and
eliminate in mobile devices.
Organization can ensure the availability of web server by using Linux web server.
MBC firm is mainly used the Apache webserver on Linux which always supporting the
web pages that required by hardware system present within organization. So as require for
company to configure Linux as a root sever. In order to perform various task and check
availability of web-browser (Wixey, Johnson and De Cristofaro, 2020). The organization need to
visit the website and hosted with the help of Apache web server. Afterwards, it has been
developed the connection from local host whereas firm identify the connection between website
on Linux web server in proper manner. In some situation, it will require to enter address of URL
and perform the significant tasks or ensure the availability the webserver.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Initially, it has established the connection and check availability service status. If in case server
has completely stopped and then restart again the server. Sometimes, it also identified the issue
or problem so that it increases conflict (Wixey, Johnson and De Cristofaro, 2020). If one port
conflict with another entire running program stopped. In this way, it will require to check the
availability of Apache web server and running the system in proper manner.
Furthermore, MBC firm can easily manage hosting service and also self-diagnostic. In
order to monitor and analyse fault within system. At last, MBC ensure the availability of apache
webserver.
Understand the impact of employee on information security within organization,
recommendation to minimize the risk of employee.
In recently, it has rapidly increased the usage of online tool and platform among existing
potential people. In this way, MBC allows to the use of various platform by staff member at
workplace. As slowly, enterprise have realized that social media and other tool impacts on the
organization in term of security and privacy (Wixey, Johnson and De Cristofaro, 2020). The
online tool influence attitude of staff member to access the information or data quickly but it also
impacted on the business process.
As per given Scenario, MBC is also based on the TV broadcasting firm which always
share information from one device to another by using Social media platform. In this way, it has
been increased the vulnerabilities to the information security (Wiryawan and et.al., 2019). It is
important to protect the broadcasted information because authorized users leaked sensitive
through social media platform. Before broadcasting data which require to identifying the data
leakage situation within system. Furthermore, it should be recommendations that useful for
organization to minimize risk of threat whereas employee can mobile phone to access data at
workplace.
Recommendations
It will be restricted the physical access and always use mobile device within organization
premises.
At workplace, staff members are not allowed to record and save any kind of organization
data within personal device.
All devices must connect with system which continuously monitor or analyse availability
of transferred information.
5
has completely stopped and then restart again the server. Sometimes, it also identified the issue
or problem so that it increases conflict (Wixey, Johnson and De Cristofaro, 2020). If one port
conflict with another entire running program stopped. In this way, it will require to check the
availability of Apache web server and running the system in proper manner.
Furthermore, MBC firm can easily manage hosting service and also self-diagnostic. In
order to monitor and analyse fault within system. At last, MBC ensure the availability of apache
webserver.
Understand the impact of employee on information security within organization,
recommendation to minimize the risk of employee.
In recently, it has rapidly increased the usage of online tool and platform among existing
potential people. In this way, MBC allows to the use of various platform by staff member at
workplace. As slowly, enterprise have realized that social media and other tool impacts on the
organization in term of security and privacy (Wixey, Johnson and De Cristofaro, 2020). The
online tool influence attitude of staff member to access the information or data quickly but it also
impacted on the business process.
As per given Scenario, MBC is also based on the TV broadcasting firm which always
share information from one device to another by using Social media platform. In this way, it has
been increased the vulnerabilities to the information security (Wiryawan and et.al., 2019). It is
important to protect the broadcasted information because authorized users leaked sensitive
through social media platform. Before broadcasting data which require to identifying the data
leakage situation within system. Furthermore, it should be recommendations that useful for
organization to minimize risk of threat whereas employee can mobile phone to access data at
workplace.
Recommendations
It will be restricted the physical access and always use mobile device within organization
premises.
At workplace, staff members are not allowed to record and save any kind of organization
data within personal device.
All devices must connect with system which continuously monitor or analyse availability
of transferred information.
5
Discuss the Linux Sever Auditing tool and how it can be used by MBC to analyse or monitor
web server.
The auditing and checking the Linux server, ensure that it completely configured with the
system. It provides the better security and privacy to monitor different activities of server. In
MBC, Administrator get locked up with working on regular task. Sometimes, it is important to
complete the task effectively and efficiently. Here some tools that always helping to automate
auditing and also monitoring Linux system in proper manner.
Tiger: it is based on the open source Linux tool which provide the facility to check
availability accounts, file system (Wiryawan and et.al., 2019). It is consider as auditing
tool which automatically check file system and give permission to secure information or
data. Sometimes, it is highlighting things such as policies and procedures of installation
Tiger.
NIX Auditor: it is another type of tool that is geared towards RHEL. It also working on
the Ubuntu and other type of Nix auditor. It is the most efficient auditing tool that will
check the password gaining and maintain the account or file system in proper manner.
LYNIS: it is a type of well-designed tool or platform that always support various version
of Linux. Many developers are focused on the active on social media tool include online
dashboard. It allows to check the servers against an appropriate policies (Wiryawan and
et.al., 2019).
As per discussion, it has explained the various Linux auditing tools which providing the facilities
to record large amount of data or information in proper manner. MBC firm uses these tool to
monitor and analyse the problem if organization find out in webserver. This will help for
debugging Linux system while eliminating email web server problem efficiently. In order to
increase the business performance as well as efficiency. As per identification of any problem and
issue during task execution which needed to use Linux auditing tool for providing the brief idea
of particular issue. Sometimes, it also useful for eliminating and removing threats within system.
6
web server.
The auditing and checking the Linux server, ensure that it completely configured with the
system. It provides the better security and privacy to monitor different activities of server. In
MBC, Administrator get locked up with working on regular task. Sometimes, it is important to
complete the task effectively and efficiently. Here some tools that always helping to automate
auditing and also monitoring Linux system in proper manner.
Tiger: it is based on the open source Linux tool which provide the facility to check
availability accounts, file system (Wiryawan and et.al., 2019). It is consider as auditing
tool which automatically check file system and give permission to secure information or
data. Sometimes, it is highlighting things such as policies and procedures of installation
Tiger.
NIX Auditor: it is another type of tool that is geared towards RHEL. It also working on
the Ubuntu and other type of Nix auditor. It is the most efficient auditing tool that will
check the password gaining and maintain the account or file system in proper manner.
LYNIS: it is a type of well-designed tool or platform that always support various version
of Linux. Many developers are focused on the active on social media tool include online
dashboard. It allows to check the servers against an appropriate policies (Wiryawan and
et.al., 2019).
As per discussion, it has explained the various Linux auditing tools which providing the facilities
to record large amount of data or information in proper manner. MBC firm uses these tool to
monitor and analyse the problem if organization find out in webserver. This will help for
debugging Linux system while eliminating email web server problem efficiently. In order to
increase the business performance as well as efficiency. As per identification of any problem and
issue during task execution which needed to use Linux auditing tool for providing the brief idea
of particular issue. Sometimes, it also useful for eliminating and removing threats within system.
6
CONCLUSION
From above discussion, it has summarized about the concept of cybersecurity that is always
help for organization to prevent from other unauthorized access. It is useful for maintaining
security and privacy of system effectively and efficiently. The report is mainly focused on the
Linux web server which consider as most effective and efficient way to protect data. It can be
identified the two security protection technique for mobile phone and ensure that availability of
web service by using Linux server. Furthermore, consider as various Linux server auditing tools
for purpose of analyzing and monitoring the webserver, email server problem.
7
From above discussion, it has summarized about the concept of cybersecurity that is always
help for organization to prevent from other unauthorized access. It is useful for maintaining
security and privacy of system effectively and efficiently. The report is mainly focused on the
Linux web server which consider as most effective and efficient way to protect data. It can be
identified the two security protection technique for mobile phone and ensure that availability of
web service by using Linux server. Furthermore, consider as various Linux server auditing tools
for purpose of analyzing and monitoring the webserver, email server problem.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
REFERENCES
Book and Journals
Brilingaitė, A., Bukauskas, L. and Kutka, E., 2019, July. Detection of Premeditated Security
Vulnerabilities in Mobile Applications. In ECCWS 2019 18th European Conference on
Cyber Warfare and Security (p. 63). Academic Conferences and publishing limited.
Chetty, N. and Alathur, S., 2019. An architecture for digital hate content reduction with mobile
edge computing. Digital Communications and Networks.
Douglas, H., Harris, B. and Dragiewicz, M., 2019. Migrant women are particularly vulnerable to
technology-facilitated domestic abuse. The Conversation. (1).
Korać, D., Damjanović, B. and Simić, D., 2020, March. Information Security in M-learning
Systems: Challenges and Threats of Using Cookies. In 2020 19th International
Symposium INFOTEH-JAHORINA (INFOTEH) (pp. 1-6). IEEE.
Wiryawan, D. and et.al., 2019. Malware Mobile Devices in Indonesia. KnE Social Sciences.
pp.259-267.
Wixey, M., Johnson, S. and De Cristofaro, E., 2020. On the Feasibility of Acoustic Attacks
Using Commodity Smart Devices. arXiv preprint arXiv:2001.07157.
8
Book and Journals
Brilingaitė, A., Bukauskas, L. and Kutka, E., 2019, July. Detection of Premeditated Security
Vulnerabilities in Mobile Applications. In ECCWS 2019 18th European Conference on
Cyber Warfare and Security (p. 63). Academic Conferences and publishing limited.
Chetty, N. and Alathur, S., 2019. An architecture for digital hate content reduction with mobile
edge computing. Digital Communications and Networks.
Douglas, H., Harris, B. and Dragiewicz, M., 2019. Migrant women are particularly vulnerable to
technology-facilitated domestic abuse. The Conversation. (1).
Korać, D., Damjanović, B. and Simić, D., 2020, March. Information Security in M-learning
Systems: Challenges and Threats of Using Cookies. In 2020 19th International
Symposium INFOTEH-JAHORINA (INFOTEH) (pp. 1-6). IEEE.
Wiryawan, D. and et.al., 2019. Malware Mobile Devices in Indonesia. KnE Social Sciences.
pp.259-267.
Wixey, M., Johnson, S. and De Cristofaro, E., 2020. On the Feasibility of Acoustic Attacks
Using Commodity Smart Devices. arXiv preprint arXiv:2001.07157.
8
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.