E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection
Security. File Security User-level protection Protect personal files Three ways of protection...
-
date post
20-Dec-2015 -
Category
Documents
-
view
217 -
download
2
Transcript of Security. File Security User-level protection Protect personal files Three ways of protection...
![Page 1: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/1.jpg)
Security
![Page 2: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/2.jpg)
File Security
•User-level protection•Protect personal files•Three ways of protection• password-based
• encryption-based
• access right
![Page 3: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/3.jpg)
Password protection
•Login and password•Login names are public• /etc/passwd
•passwd
•yppasswd, nispasswd
![Page 4: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/4.jpg)
Encryption
•Covert (encrypt) a file to a different form•Use gpg•gpg --gen-key• generates private & public keys
• ~/.gnupg
•encrypt & sign emails and files
![Page 5: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/5.jpg)
System security
•Everyone is under threat•Specially when using Internet•Local threats also•Common sense, good practice•Err on the side of caution
![Page 6: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/6.jpg)
Some threats
•Denial of Service (Dos)• Intrusion•Snooping•Viruses, Worms & Trojans•Rootkits
![Page 7: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/7.jpg)
Initial steps to security
•shut down unwanted daemons• netstat -an
• /etc/services
•kill unwanted daemons• remove from init
•changing access permissions to needed services
![Page 8: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/8.jpg)
Best Practices
•Complex passwords•Skip the root account•Don’t trust random binaries• strace, ltrace
•Log files• /var/log/syslog etc.
•Software update•Physical security
![Page 9: Security. File Security User-level protection Protect personal files Three ways of protection password-based encryption-based access right.](https://reader035.fdocuments.in/reader035/viewer/2022062714/56649d445503460f94a2113a/html5/thumbnails/9.jpg)
Firewall
•Packet filtering•Stateless / stateful filtering•netfilter / iptables•Firewall products• Firestarter, Smoothwall Express, IPCop, Shoreline