MSc Practical UNIX Security ''LDAP'' - Essay Example

Comments (0) Cite this document
Summary
Table of Contents What is LDAP? - 2-3 LDAP Account Management - 3 LDAP Synchronization Issues - 3-5 LDAP Directory Services - 5-6 Solutions - 6-7 ACL on LDAP - 7-8 LDAP Auditing Features -…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
MSc Practical UNIX Security LDAP
Read TextPreview

Extract of sample "MSc Practical UNIX Security ''LDAP''"

Download file to see previous pages The Light Weight Directory Access Protocol is a communication standard that provides a communication channel for the clients within a directory service. A comprehensive definition of LDAP is defined as “Lightweight Directory Access Protocol, a protocol which helps find people, computers and other resources on a network. Designed to work with existing address-book standards and improve compatibility between widely differing systems, the ldap standard was adopted by the ietf in 1997 and now forms the basis of many white-page directories on the web. It has also been incorporated directly into some software programs and operating systems, making it possible to find e-mail addresses without visiting a directory site” (Ldap. 2003). LDAP was established after X.500 protocol, which was also a directory service standard protocol. ...
Active directory is “an implementation of LDAP directory services by Microsoft for use in Windows environments. Active Directory allows administrators to assign enterprise-wide policies, deploy programs to many computers, and apply critical updates to an entire organization. An Active Directory stores information and settings relating to an organization in a central, organized, accessible database. Active Directory networks can vary from a small installation with a few hundred objects, to a large installation with millions of objects” (Active Directory. 2007). Few checklists are applicable including the network connectivity testing and raising the Active directory domain functional level to Windows 2003. Moreover, for Linux / UNIX, ‘identity management module’ installation is required on the domain controller along with the configuration of NIS server. LDAP Account Management In order to manage account in the UNIX network environment, the Unix systems are configured with Microsoft Active directory for centralized management of user accounts. Moreover, it also solidify network security by integrating role based access and Kereberized authentication. Consequently, the operational cost is minimized, for the management of UNIX accounts. Moreover, UNIX contains various features for authentication and authorization. The authentication is concerned with user authenticity and authorization is related to ensure that users have been granted to perform tasks. However, there are some issues associated with UNIX account management: Synchronization is not properly conducted Vulnerabilities related to NIS Operating on LDAP services without multiple platform support Standardized management for ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“MSc Practical UNIX Security ''LDAP'' Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1410706-msc-practical-unix-security-ldap-
(MSc Practical UNIX Security ''LDAP'' Essay Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/environmental-studies/1410706-msc-practical-unix-security-ldap-.
“MSc Practical UNIX Security ''LDAP'' Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/environmental-studies/1410706-msc-practical-unix-security-ldap-.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF MSc Practical UNIX Security ''LDAP''

MSc computer system security 'Practical Windows Security'

...? Practical Windows Security Contents Introduction to windows security and vulnerabilities 3 The use of remote procedurecall 5 CVE- 2003-0352 7 Mitigating Factors 9 Security solutions 9 Conclusion 10 Reference List 12 Introduction to windows security and vulnerabilities A Windows system is prone to security threats once it is used as an internet server. The typical installation of the windows NT/2000 and other vulnerabilities makes it an easy target for attackers. This way computer networks are damaged on a regular basis. Although network security has improved and strengthened over time but so have the attackers advanced...
9 Pages(2250 words)Essay

MSc computer system security 'RFID'

.... The following examples will illustrate the significance of deploying security infrastructure and mitigation privacy in RFID technologies. Furthermore, hacking and penetration in RFID infrastructure is detected. This threat is sufficient to proof that the technology is vulnerable to hackers and there should be counter measures in terms of protection and security. The practice code for utilizing Radio Frequency Identification Technology in UK is in retail outlets [14] initialized in March 2006 by the Chartered Institute of Logistics and Transport (UK). Furthermore, the study of this [15] document was accomplished by the Parliamentary Office if Science and Technology located in UK In...
20 Pages(5000 words)Essay

LDAP

.... Ensuring the Security of Your Production Environment. [Online] Available at: http://download.oracle.com/docs/cd/E13222_01/wls/docs100/lockdown/practices.html [Accessed 18 February 2011]. Oracle, 2010. Security. [Online] Available at: http://download.oracle.com/javase/jndi/tutorial/ldap/security/index.html [Accessed 19 February 2011]. Tech-Faq, 2010. Brute Force Attack. [Online] Available at: http://www.tech-faq.com/brute-force-attack.html [Accessed 19 February 2011]. The Linux Documentation Project, 2010. 1.1. What's LDAP ? [Online] Available at: http://tldp.org/HOWTO/LDAP-HOWTO/whatisldap.html [Accessed 18 February 2011]. Wrox Press,...
8 Pages(2000 words)Coursework

MSc Practical UNIX Security

...?Practical UNIX Security Table of Contents Introduction UNIX is the most popular operating system which has been used extensively, and a lot of people still use it as it has been used in the past. However, a lot of IT experts who used UNIX systems in the earlier period discovered it inflexible from the security point of view. As its control was inspiring, its command-line interface needed technological proficiency; its grammar or syntax was not perceptive, and its interface was not user friendly. However, in the IT market, the UNIX operating system has been the medium for broad transformations that have authorized...
8 Pages(2000 words)Essay

Practical UNIX Security

.... It helps to exploit existing and potential breaches in terms of network security and CVE 2010-3872. References Cve. 2011. Computer Desktop Encyclopedia, , pp. 1. , security definition . Available: http://www.businessdictionary.com/definition/security.html [3/9/2011, 2011]. Common Vulnerabilities and Exposures. 2007. Network Dictionary, , pp. 111-111. CHAFFEY, D., 2006. Internet marketing: strategy, implementation and practice Harlow: Financial Times Prentice Hall. , FastCGI | FastCGI - . Available: http://www.fastcgi.com/drupal/ [3/10/2011, 2011]. , mod_fcgid - Apache HTTP Server . Available: http://httpd.apache.org/mod_fcgid/mod/mod_fcgid.html [3/10/2011, 2011]. , mod_fcgid - FastCGI...
10 Pages(2500 words)Assignment

Practical UNIX Security

...varieties of Unix are GNU/Linux, Sun Solaris and MacOS X (Rosen Kenneth H., 2006). UNIX security is the way of protecting a UNIX or any other Unix-like operating system (Ross Seth T., 2000). A safe atmosphere cannot be obtained by just designing conception of these operating systems but by observant administrative and user practices. LDAP that is Lightweight Directory Access Protocol is nothing but an application protocol used for editing and reading directories over an internet protocol network (Morimoto Rand, 2008). Directory here refers to the set of organized records, for instance, a telephone directory is organized...
10 Pages(2500 words)Assignment

UNIX

..., will find the 3D desktop interface quite a charming working tool with host of features to tinker with. 4. The desktop with the 3D interface works faster than the traditional interface. The UNIX operating system enables the speed to increase as the system is an upgraded version. 5. The 3D interface is a creative means to perform both graphic and text tasks. The graphics, especially, come out in a very presentable 3 dimensional format that comes out poignant in PowerPoint presentation. This is a far improvement over the 2D interface. Disadvantages 1. The 3D interface is considered weak to maintain the strength of the network. Its feasibility and overall practicability is in question. 2. It may prove hard...
8 Pages(2000 words)Essay

LDAP

...side applications with no directory access support, of which there are few. Therefore, the need to use LDAP becomes largely unnecessary. In its goal to remain lightweight, LDAP does not include a security or encryption service, and with the increasing concerns about network security, this option makes it use less prevalent among businesses and individual users (Gracion Software, 2011). Deciding factors for making LDAP an open protocol An open source protocol allows user contribution to the software development. When LDAP became open source, the developers intended to eliminate dependence on a select group of vendors and increase the...
1 Pages(250 words)Essay

UNIX SHELLS

...UNIX Shells Introduction Unveiled in 1960s, UNIX is a requisite operating system whose enhancements since then up to date present users with heightened enjoyment as well as flexibility while using a computer (Ramesh, 2010). This is especially undertaking varied tasks that entail numerous commands whereby without its speed their execution would not have been possible in the current state of technological knowhow. To execute these tasks, it normally utilizes shells whose role encompasses acting as an interface amid the user and kernel whereby after login by the user the program scrutinizes the availed information to align appropriately (Ramesh, 2010). Hence, interpreting login commands that will result to...
2 Pages(500 words)Essay

LDAP and Security

...2011]. Oracle Corporation, 2008. Ensuring the Security of Your Production Environment. [Online] Available at: http://download.oracle.com/docs/cd/E13222_01/wls/docs100/lockdown/practices.html [Accessed 18 February 2011]. Oracle, 2010. Security. [Online] Available at: http://download.oracle.com/javase/jndi/tutorial/ldap/security/index.html [Accessed 19 February 2011]. Tech-Faq, 2010. Brute Force Attack. [Online] Available at: http://www.tech-faq.com/brute-force-attack.html [Accessed 19 February 2011]. The Linux Documentation Project, 2010. 1.1. What's LDAP ? [Online] Available at: http://tldp.org/HOWTO/LDAP-HOWTO/whatisldap.html ...
8 Pages(2000 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic MSc Practical UNIX Security ''LDAP'' for FREE!

Contact Us