INFT 5033 Operating Systems and Application Security Report 2022
Verified
Added on 2022/10/09
|18
|2365
|27
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Operating Systems and Application Security 1 INFT 5033 – OPERATING SYSTEMS AND APPLICATION SECURITY By (Student’s Name) (Course Name) (Tutor’s Name) (Date)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Operating Systems and Application Security 2 Table of Contents Introduction......................................................................................................................................2 Overview of the case study..............................................................................................................2 Part one: Security hardening requirements and controls.................................................................3 Common hardening techniques for both windows and Linux.....................................................3 Specifics for hardening Linux operating systems........................................................................5 Specifics for hardening window based operating system............................................................5 Part two: Implementation Plan........................................................................................................6 Overview of VMWare workstation..............................................................................................6 Implementation 1: Strong passwords...........................................................................................7 Implementation 2: Setting up of restrictions on VMs................................................................11 Implementation 3: Updating Virtual machines..........................................................................11 Implementation 4: Configuring Virtual machine.......................................................................12 Implementation 5: Cloning the Virtual machine........................................................................12 Implementation 6: disabling unnecessary services....................................................................14 References......................................................................................................................................15
Operating Systems and Application Security 3 Introduction System hardening is a collection of techniques, best practices and tools to reduce weaknesses in technology applications, firmware, and systems. The major aim of hardening is to reduce security risk by eliminating potential attacks and considering system’s attack surface. NIST has developed a voluntary framework which consists of guidelines and standards to manage cybersecurity risks. The computer security framework developed by NIST provides guidance of how public and private organizations in the US can improve their ability to detect, respond, and private computer related attacks. This report will document comprehensively security control implementation in a virtual machine; this will consist of one file server, one internal managed windows client, one internal Linux client, and one unmanaged device. This paper will utilize VMWare workstation pro software to create the virtual machines Overview of the case study LargeCorp is a fictional organization with three physical sites across a variety of geographical locations. The internal division of the organization includes human resource, information technology sector, finance, manufacturing, and research and development section. The organization supports both Linux and windows servers and clients. The organization has specified that files must be provided only to the authorized users on the organization LAN through SMB protocol. The files shared must be classified as restricted for internal use only or highly confidential and public information.
Operating Systems and Application Security 4 Part one: Security hardening requirements and controls Common hardening techniques for both windows and Linux Cyber-related attacks are very common nowadays. Hackers attack websites and information systems using various cyber-attack techniques which are referred to as attack vectors. To prevent such attacks, operating systems needs to get hardened. Hardening is the process that assist in the enhancement of operating systems. Proper operating system hardening shields an organization from cyber related attacks in turn reduces them as well. Operating system hardening is a process that assists in reducing cyber related attacks surface of an information system by disabling functionalities which are not required while at the same time maintaining minimum functionality which is required. According to NIST, operating system hardening is the process of making an operating system bulletproof; not leaving the operating system exposed to the general public on the wide area network without any form of protection. There are various techniques which are applied to harden an operating system. First, a system administrator needs to keep all operating system updated with the latest version and the most robust version. This can be achieved by making sure that security patches and all the hot fixes are constantly updated. Second, LargeCorp needs to install the latest service pack for operating systems for all windows-based version. Third all, the organization switches and routers need to be protected with a strong password. For Linux based operating system an organization needs to remove all the unnecessary drivers which are not in use. This also applies to window-based operating system. To all the user computer one needs not to create two accounts in the administrator groups. Also one needs to disable and delete unnecessary accounts quarterly and disable non-essential services. In addition, an organization needs to enable audit
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Operating Systems and Application Security 5 logs to capture failed and successful login efforts which are elevated from usage privileges and any kind of unauthorized activities. In addition, an organization needs to secure CMOS settings and ensure file and directory protection via the use of access control lists (ACLs) and file permissions. Also, the organization system administrator needs to ensure that all the log all activity, warnings and errors are configured appropriately and at the same tighten NTFS and registry partitions(Mani, 2016). LargeCorp needs to use strong passwords in all the machines and ensure that services are running with least-privileged accounts. The organization needs also to disable all the unnecessary file sharing and remove administrative shares if not they are needed. To adopt the above hardening techniques an organization needs to completely align with defense in depth strategy. This strategy ensures that security is hardened at host level, the operating system level, the application level, user level, and the physical level. Defense in Depth approach includes security measures at each of the above layers. Other common techniques are programs clean-up, this process usually removes unnecessary programs which, it is important to note that every program is potential entrance point by hackers, Cleaning these programs assists in limiting the number of ways a hacker can enter into a computer. Also an organization needs to ensure group policies; here a system administrator needs to define groups can’t or can access and also maintain these rules. Most are the times user error that leads to a cyber-attack. To meet this operating system hardening technique and organization needs to establish and ensure that all users are aware and complies with the laid procedures about group policy. An example, every employee at LargeCorp needs to implement strong passwords on their user accounts. Configuration baselines is another
Operating Systems and Application Security 6 technique; this is the process of measuring changes in a network, software, and hardware. To create baselines means selecting something to measure and measuring it consistently for a period of time(Smith, 2019). Specifics for hardening Linux operating systems LargeCorp needs to use SELinux and other specified Linux extensions. This enforces limitations on a network and other related programs. SELinux provides a flexible Mandatory Access Control. Here one had to run Kernel to protect the operating system from malicious or any flawed applications which can damage or destroy Linux Operating system. Second, LargeCorp needs to set-up passwords which are aging for Linux users to ensure a better security. Here the chage command in Linux changes the number of days between the data of the last password change. This information is usually used by the Linux system to determine when a Linux user ought to change their password. Here one ought to disable password aging. In addition, on passwords one can restrict users from the use of the previous old passwords. This enables by Pam_Unix module parameter which can be used to configure the number of previous passwords which cannot be reused. Third on Linux LargeCorp can look user accounts which have already logged in. This can be achieved by using the faillog command, this displays faillog records or sets the logins failure limits. Forth, one can disable root login; here one should use sudo to execute root level command as when it is required, sudo enhances the security of the operating system without having to share root password with other admins and users. The command sudo provides simple tracking and auditing features. Lastly, an organization needs to disable unwanted Linux services and daemons(FedoraLinux, 2019).
Operating Systems and Application Security 7 Specifics for hardening window based operating system To harden window based operating system, the very first technique is remove all the executable and registry entries. By forgetting to remove unneeded executables and all the registry entries usually allows a hacker to invoke something which has been previous disabled. Second, LargeCorp needs to apply the appropriately restrictive permissions to services, end points, and files. Inappropriate permissions usually gives an attacker permissions to an opening Justified high level security design Part two: Implementation Plan Overview of VMWare workstation In this section, this paper will highlight how to go about implementing the above discussed techniques using VMware workstation. To start with VMWARE is a hosted hypervisor which runs on 64 bits version of Linux and windows operating system. The software enables uses to set-up virtual machines on a single physical machine and use them simultaneously along with the actual machine. Each of the virtual machine has the ability of executing its own operating system which includes versions of Microsoft windows, MS-DOS, BSD, and Linux. VMWare workstation was first developed and sold by VMware Inc. which is one division of Dell technologies. The initial release of the software was in 1999, where the programming languages which was used was C programming language. One of the reasons as to why this paper has gone for VMWare workstation is because it can save the state of virtual machine at any instant. Other reasons is because, the software has high-performance that supports DirectX 10 and OpenGL. The software also support resolution display, and helpful snapshots. It also
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Operating Systems and Application Security 8 offers cross-compatibility which can run across various platforms such as windows and Linux- based. It also has the restricted access feature to virtual machine. Figure 1: The look of VMWare workstation pro The installed devices is as shown by the figure below Figure 2: Samples virtual machines which have been installed
Operating Systems and Application Security 9 Implementation 1: Strong passwords To implement this feature is very simple since one only puts some restrictions on them. Vmware workstation software has done a lot of work as one is able to share the VMs and even apply restrictions. To apply password restriction one just goes on VM tab then settings as shown , then options tab, then access control, then encryption control, and then encrypt. One is then prompted to enter password and confirm by clicking Ok and the closing the Vmware workstation console. This is shown by the figures shown below Figure 3: Start by editing the virtual machine settings
Operating Systems and Application Security 10 Figure 4: Continue encrypting the virtual machine bye entering the password
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Operating Systems and Application Security 11 By clicking on the encrypt button, encryption process starts which takes at most twenty minutes to complete as shown by the figure below; incase one is using slow drive the process might take a long period of time this is as shown by the diagram below
Operating Systems and Application Security 12 Figure 5: Password encryption process When the process is ready one can run the VMWARE virtual machine which is as shown by the diagram below. Figure 5: The appearance of VMware machine after encryption
Operating Systems and Application Security 13 Implementation 2: Setting up of restrictions on VMs As the name applies restrictions usually limits the usage of VM(s). Restrictions are done on VMs because of licensing for a software. For production an organization needs to buy VMware Horizon Felx product that provides centralized control for the VMs. This is done opening settings for the organization VM and the enabling restrictions box. One can configure all restrictions VMware workstation and then inputting restrictions password as shown by the figure shown below Figure 6: Putting restrictions Implementation 3: Updating Virtual machines From time to time one will be required to update the end-user virtual machines. There are two major ways that one can use to provide updates. One is updating the guest operating system and then providing an update to a pragma that is running in the guest operating system. Second is through updating the virtual machine itself or its policies.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Operating Systems and Application Security 14 Implementation 4: Configuring Virtual machine Here one starts by configuring the display preferences. This controls the display settings of all virtual machines. The procedure starts by selecting the edit feature then preference and selecting display. One can then select one of the options which are autofit window; this option resizes the application windows and autofit guest which changes the virtual machine settings to match the applicati0on window. Implementation 5: Cloning the Virtual machine Cloning assists in creating more space for other machines. To do this once just opens Vmware workstation, then right clicks the machine that one wants to create a copy if and the scrolls down to manage and then click clone as shown by the figures below Figure 7: Choosing the current state in the virtual machines
Operating Systems and Application Security 15 Figure 8: creating a full clone Figure 9: Providing a name for the new virtual machine
Operating Systems and Application Security 16 Figure 10: Finishing up the cloning process Implementation 6: disabling unnecessary services To disable unnecessary services can range from deleting those virtual machines which are not in use or which are deemed redundant. To do this one juts right clicks on the virtual machine and then click remove as shown by the figure below Figure 10: Removing unnecessary services
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Operating Systems and Application Security 17 References FedoraLinux, 2019.40 Linux Server Hardening Security Tips.[Online] Available at:https://www.cyberciti.biz/tips/linux-security.html [Accessed 30th September 2019]. Mani, V., 2016.Reducing Cyber Attacks through effective hardening techniques.[Online] Available at:https://www.linkedin.com/pulse/reducing-cyber-attacks-through-effective- hardening-techniques-mani [Accessed 30th September 2018]. Smith, H., 2019.6 Important OS Hardening Steps to Protect Your Clients.[Online] Available at:https://www.continuum.net/blog/6-important-steps-to-harden-your-clients- operating-systems [Accessed 30th September 2019].