logo

SEC508 Linux Security Assignment

   

Added on  2019-11-19

14 Pages310 Words184 Views
Running head: SEC508 LINUX SECURITYSEC508 Linux Security Name of the StudentName of the UniversityAuthors note

SEC508 LINUX SECURITY1Task 1: Running apache on Backtrack/Kali Linux systems on theport 801. B Used URL or address I have used the address 127.0.0.1:80 to test my installation. The Above screen shot shows that the Tomcat apache server is installed on the KaliLinux virtual machine in Virtual Box.

SEC508 LINUX SECURITY21C. Two apache instances on two Virtual machines 1E. Report on the challenges and lessons learned After downloading the tar.gz file I have to create and move the downloaded file in adedicated directory to install it on the virtual machine so that the server can be executedsafely without any interruption by other processes. While using the mv command to move the file in the crated folder the shell promptedwith the permission error, after searching about the error on internet, I found that I have touse the command in Super User mode i.e. su mv command.Task 33. AInstalling fedora and assessing the system security in virtual machines in Virtual box.

SEC508 LINUX SECURITY33. BTiger is considered as an intrusion detection and security audit tool for the Linuxsystems. I have used the apt-get install tiger command line code to install it on my system. Inits installation process it also installs the tool Tripwire on my system that detects in serverintrusion by the hackers. In setting up the Tiger, we required to provide site key passphrase and local keypassphrase key. This keys helps in the securing the configuration files so that they are notmodified by the intruders as the same files can be several servers.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information System Threats Attacks and Defences
|35
|2571
|18

Computer Security-System Investigation
|12
|1368
|37

INFORMATION SYSTEM THREATS, ATTACKS AND DEFENSES.
|29
|1680
|33

Computer Security System Investigation
|20
|2886
|78

Computer Security System Investigation
|18
|2613
|81

Root Certificates- Doc
|13
|3497
|643