| Terminology | Definition |
|---|---|
| Confidentiality | Ensures that only the autorized user has access to data. |
| Integrety | Ensures that data has not changed unexpectedly |
| Availability | Ensures that users and services have access to the resources they need when they need them |
| Hardening | A process of making a host or app configuration secure by reducing its attack surface. |
| Principle of Least Privilege | A basic principle of security that something shoudl be allocatedd the minimum necessary rights, privileges, or information to preform its role. |
| Rootkits | Class of malware that modifies system files, often at the kernel level |
| Advanced Intrusion Detection Environment (AIDE) | Monitor file integrity and system settings for unauthorized changes |
| rkhunter | A software tool to scan the system and look for rootkits/backdoors by waatching for suspisious kernel modules and hidden files. |
| fsck | Software that checks and repairs the Linux filesystem |
| auditd | Softwware to monitor file access and modifications, including system, configuration, and application files |
| SELinux | Restricts access to essential system files using mandatory access controls |
| Tripwire | A Software to check for changes in system files |
| Identity and Access Managment (IAM) | A Security process that provides identification, autentication and autorization mechanisms for users, computers, and othere entitites to work with organizationl assets like networks, operating systems, and applications. |
| Single Sign On (SSO) | Autentication technology that enables a user to authenticate once and receive autorizations for multiple services |
Confidentiality - Ensures that only the autorized user has access to data.
Integrety - Ensures that data has not changed unexpectedly
Availability - Ensures that users and services have access to the resources they need when they need them
/sbin/nologin - Is great for service/object accounts that do not need interactive shells can be created with useradd -s /sbin/nologin
/bin/rbash - Is great for security as it is a restricted shell that is used for limiting user actions and commands
Banner message purposes include:
Linux Distros have serveral banner message options
# With dd
lsblk # To determine the partition that you would like to overwrite
umount /dev/sdc1 # Unmount the partition
dd if=/dev/urandom of=/dev/sdc1 bs=512 status=progress
# Shred to shred partition
lsblk # To determine the partition that you would like to overwrite
umount /dev/sdc1 # Unmount the partition
shred -v -f -n 3 -z /dev/sdc1
# Shred for a single file
shred -u -v -n 3 -z fileToShred
Linux stores PAM configurations in the /etc/pam.d direcotry and are formated {module interface} {control flag}
The four module interfaces are account, auth, password, and session
There are also four control flags