Cyber Security
Cyber Security
8-1
Linux is a multitasking operating system that has different versions such as red hat, fedora Linux which have slight to major differences, among others. In works stations and mainframes, it is mainly used for scientific-technical applications and is best suited for larger systems and networks. Taking appropriate care of the Linux operating system and keeping it up to date is the best way to keep them using the newest features, operating, secure, and at their peak performance. Where there is a patch available, the systems are usually vulnerable to attacks.
Some patches cause problems to the operating system in the Alexander Rocco Network when installed. It is wise to test them before applying them, especially in large networks. Linux operating system has many packages developed by contributors globally (Simpson, Backman & Corley, 2010). This means that it has diverse sources of code and to discover its flaws only happens when incorporating the final product. OpenVAS is a tool used for scanning to detect vulnerabilities and recommend users on how to solve security issues in a Linux computer. It is safe to say that the system in question is secure until replacement in 2017 but the user can harden its security.
It is good to enable BIOS password and configure the BIOS to disable booting from external devices, floppy drive CD in BIOS. It is also important to have partitions that are different, which group data separately, to ensure there is higher data security in case of a disaster. It is good to minimize the number of packages hence minimizes vulnerabilities. It is safe to use the SSH protocol during communication with the server since it uses encryption technology. It is always good to keep the system updated with the latest releases security fixes, kernel, and patches.
9-2
An embedded system is a computer system that is not a PC or a general-purpose server in the Alexander Rocco Network. The main components of an embedded system are the embedded OS and its hardware. Some of the embedded systems include switches, routers, printers and digital phones among others and are mostly found in corporate networks and buildings. General-purpose computers are easier to patch than embedded ones. It is preferable to upgrade the system so they release updates when vulnerabilities are discovered rather than getting embedded systems. The systems use drivers to interface with hardware devices. There is a need to patch the drivers to avoid exploitation.
A buffer overflow is when data is written past its end and overwriting the subsequent addresses contents on a stack. Embedded systems are the most vulnerable (AlHarbi, & Lin, 2016). Buffer overflow is detected by paying attention to buffers used when working with source code. Using a language that does not allow buffer overflow vulnerabilities is the best way to prevent them. Languages like Java, and Python among others don’t require special changes to mitigate overflow vulnerabilities. Tools used to detect buffer overflow are compile and runtime. When vulnerabilities are identified, it is good to change the codebase.
The Alexander Rocco Network uses Linux which is a multitasking operating system that has different versions such as the red hat and fedora Linux among others. OpenVAS is a tool used for scanning to detect vulnerabilities and recommend users on how to solve security issues in a Linux computer. It is always good to keep the system updated with the latest releases security fixes, kernel, and patches. The main components of an embedded system are the embedded OS and its hardware. Embedded systems are the most vulnerable to buffer overflow. Tools used to detect buffer overflow are compile and runtime. When vulnerabilities are identified, the user needs to find solutions immediately.
References
Simpson, M. T., Backman, K., & Corley, J. (2010). Hands-on ethical hacking and network defense. Cengage Learning.
AlHarb i, K. N., & Lin, X. (2016). U.S. Patent No. 9,251,373. Washington, DC: U.S. Patent and Trademark Office.