tailieunhanh - hack sun book hack proofing sun solaris phần 10

trước khi mật khẩu thực sự thay đổi trong các tập tin hệ thống. Nếu người dùng chọn một mật khẩu mà được coi là quá yếu, mật khẩu sẽ bị từ chối và người dùng sẽ được yêu cầu chọn một số khác. Hãy chắc chắn để yêu cầu chiều dài mật khẩu tối thiểu là tám ký tự. | Hack Proofing Sun Solaris 8 Fast Track Appendix 363 Chapter 1 Continued 0 Monitor the system for rogue world-writable files and change their access modes to something more restrictive 775 at the minimum but preferably 644 . Securing against Physical Inspections 0 Change the security mode in the OpenBoot PROM to protect the system from booting from unauthorized media. 0 Set a password that restricts access to OpenBoot configuration. 0 Set the oem-banner to display an Authorized Use banner similar to the one used in etc issue and etc motd. Documenting Security Procedures and Configurations 0 Create an administrative log such as var adm that logs administrative changes made to the system as well as system information like the hardware configuration. 0 Take periodic snapshots of the free disk space with the df command. 0 Take periodic snapshots of the CPU and memory utilization metrics with the vmstat command. Chapter 2 Securing Solaris with the Bundled Security Tools The Orange Book 0 The Orange Book is the foundation for computer security as it is modeled today providing the de facto standard for assessing security levels with classifications such as C1 C2 and B1. 0 The file security defined in the Orange Book provides the basic model used in virtually all computer systems today. 0 Even though the Orange Book classification levels go from the lowest level D to the highest level A in reality except for a very few exceptions most operating environments run under C1 C2 or B1 levels. 364 Appendix Hack Proofing Sun Solaris 8 Fast Track Chapter 2 Continued Choosing Solaris 8 C2 Security 0 The SunSCREEN Basic Security Module is required in order to bring the default installation of the Solaris 8 OE up to C2 level security. 0 Auditing must be configured and managed with an organized methodology in order for it to be useful and controllable. 0 Auditing can be finely configured and managed by editing the audit_control and audit_user files and

TỪ KHÓA LIÊN QUAN