Nobody downloaded yet

Best Pratices for OS, FW and SELinux - Coursework Example

Comments (0) Cite this document
Summary
One way to attain this is adoption of certain best practices. This question discusses given best practices that will help in the protection…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Best Pratices for OS, FW and SELinux
Read TextPreview

Extract of sample "Best Pratices for OS, FW and SELinux"

Download file to see previous pages Similarly, “yum update” command will be appropriate in case of a need to update an entire system (Membrey, Verhoeven & Angenendt, 2009). The yum package that comes with CentOS entails scripts for performing system-wide updates on daily basis. Users would need to enter the command su -c /sbin/chkconfig --level 345 yum on; /sbin/service yum start. This command should be followed by the root password in case a need arises to activate the daily automatic update.
It is necessary that users create copies of computer files for use in cases where the original files diminish through ways like computer crash or theft (IBM, 2013). Accidents are inevitable. Therefore, it is crucial that users regularly store work documents within a backed up network server.
Safety of the operating system will be easier to attain if certain password protection mechanisms are put in place. Examples of such mechanisms include regular change of passwords, users stopping the habit of sharing passwords or login ID (s) and the administrator of the operating system under use ensuring that the systems are accessed only after users have supplied matching combinations of the login credentials, automatic disabling of user accounts in case of login attempts that go past six.
In case of the highly vulnerable environments, it would be appropriate using Kerberos. Kerberos will employ strong encryption coupled with complex ticket granting algorithm in authenticating users on a network and to permit streams of data over IP networks. This approach will fit environments like colleges where the implementation of other security mechanisms has remained to be a challenge.
Organizations will often need firewalls to protect the confidential information from unauthorized and malicious users. Even as organizations use different access control features embedded in firewall systems to attain system ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Best Pratices for OS, FW and SELinux Coursework”, n.d.)
Retrieved de https://studentshare.org/information-technology/1655953-best-pratices-for-os-fw-and-selinux
(Best Pratices for OS, FW and SELinux Coursework)
https://studentshare.org/information-technology/1655953-best-pratices-for-os-fw-and-selinux.
“Best Pratices for OS, FW and SELinux Coursework”, n.d. https://studentshare.org/information-technology/1655953-best-pratices-for-os-fw-and-selinux.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Best Pratices for OS, FW and SELinux

Microsoft vs. Apple OS

...Microsoft vs. Apple OS Operating systems handles the details of the interaction between the user and the hardware. The operating systems are generally used in nearly all computing devices ranging from desktop computers to video games. There basically two prominent operating systems that exist for various functions and professionals; Microsoft windows and the Apple operating system. Depending on the function, the two operating systems exhibit some dissimilarity. For example, for architects and landscape architects, Microsoft windows has traditionally been one of the dominant operating system as it is compatible with a variety of programs relevant to the field such as the Autodesk AutoCAD (Cantrell & Michaels CHAP 1). The...
5 Pages(1250 words)Research Paper

The role of OS

...because of the lack of a graphical user interface. There is no well defined fact as to which operating system is better than the other. Every OS has its own disciples and haters. Every commercially available OS has its own pros and cons. Microsoft operating systems are easy to use but are expensive and low on security. Linux and UNIX on the other hand are freely available and extremely secure but lack a user friendly user interface. It depends on the type of the user and his nature of requirements that finally decides which OS would be the best for him. Answer 2 An Operating System acts an interface between the user and the computer. Although most users would have had...
32 Pages(8000 words)Essay

Windows OS Upgrade

...Running Head: Windows OS Upgrade Windows OS Upgrade for Riordan Manufacturing (Style: APA) ID 19714 Order No. 247417 27 October 2008 Abstract Operating systems used by a business form the core platform of IT enablement of the enterprise business processes. Microsoft Windows operating system is the de facto standard for business transactions at the Desktop level and one of the most preferred operating systems at the Server and Network level. Microsoft has maintained the pace of continuous innovations in their Windows operating system (and other) products keeping their pace with the various technology innovations across the world and thus... regarding the migration of their existing desktop and server operating systems to the most...
13 Pages(3250 words)Essay

Windows OS

...Windows Server 2003 Windows Server 2003 is a server operating system formed by Microsoft. Introduced on April 24, 2003 as the successor to Windows 2000 Server, it is considered by Microsoft to be the foundation stone of their Windows Server System line of business server goods. Windows Vista Windows Vista is a row of graphical operating systems used on personal computers, as well as home and business desktops, notebook computers, Tablet PCs, and media centers. Windows vista contains a new graphical user interface and a visual style dubbed Windows Aero. Differences The major difference between the two operating systems called Windows Vista and Windows Server 2003 is that both of them are built for different use. Windows Server 2003...
2 Pages(500 words)Essay

OS

...this operating system. In addition, after this version the Windows Version 2.x and 3.x were released, which were of the similar type. A number of the newest versions of Windows (however these new versions start from the version 4.0 and Windows NT 3.1) were autonomous OS that no longer reliant upon the operating system MS-DOS (Microsoft Corporation). History of Microsoft Windows Beginning from DOS Shell for Microsoft’s DOS 6 Microsoft required struggling beside the best-selling Apple Macintosh that utilized a GUI, Microsoft produced Windows 1.0. However, the name “Windows” was suggested by the Microsoft employees who got the name of the application as a Windows program. Figure 1Windows 1.0, Source :...
4 Pages(1000 words)Research Paper

Assignment 4: Best Pratices

...Women’s addiction services The case study deals with the addiction services that have been formed especially for women. There are some underpinning issues that are present in the formation of any new merger service. The macro and micro environment tend to affect the decisions for the organization; issues pertaining to this specific case are also discussed. The Interactive Domain Model has its importance and is a very useful model to be applied in the field of healthcare practices. It is regarded as one of the best practices and is implemented by gathering the complete knowledge of the business and clients. What were the underpinnings of the Womankind Addiction Service? Discuss the issues & concerns as they related to...
2 Pages(500 words)Essay

Installation and Migration Computer's OS

...system world. The recent version of windows is Windows 7, and the latest server version is Windows Server 2008 R2. But users usually prefer using Windows XP over the newer version currently. In 2009, a poll showed the dominant position of Windows, with approximately 90% of the user market share being grabbed by the company. And of that 90%, 49% pertained to Windows XP.    Linux refers to the family of Unix-like computer operating systems using the Linux kernel. Linux can be considered to have originated in 1991. It has usually been seen that users usually prefer using the Mac OS or the Windows OS rather than Linux, but in recent times, through the promotion of popular distribution such as Ubuntu, Mint...
4 Pages(1000 words)Essay

Android vs. iPhone OS

...Android vs. iPhone OS Comparing and contrasting Android and iPhone OS Google’s Android and Apple’s iPhone have somecommon features. One such major similarity is the operating system, as both work on Linux based operating systems. These companies have developed and modified this OS to suit their smart phone applications. However, while comparing the two mobile phones, many differences do crop up. These are discussed in the following paragraphs. Operating systems While iPhone has a completely closed operating system, Google has an open system for its Android mobile phone. As both systems have their own strengths and weaknesses, the following details would highlight the same. iPhone closed...
3 Pages(750 words)Essay

Chapter Ten: Special Pricing Pratices

...Price Discrimination al Affiliation Price Discrimination Q. In the New York Times charged $828 to receive the newspaper delivered to your home every day for a year. Journalist Timothy Noah discovered, however, that when he called up the newspaper and threatened to end his subscription, he was offered a 50 percent discount. He became convinced that anyone who called up and threatened to end his or her subscription would be offered the same discount. Briefly explain whether the New York Times is practicing price discrimination. In order to establish whether New York Times did practice price discrimination or not, it is important to begin by understanding what price discrimination implies. Norman (1999) defines price discrimination... Discriminat...
1 Pages(250 words)Essay

History os Asian Art

... Lidded Vessel (Ding) The ding was a ritual vessel which was used for ceremonial purposes. It was made in various shapes; that is, square, rectangle and circle. The square and rectangular dings were four legged whereas the circular dings were three legged. Initially, the ceramic made ding vessels were lidless. However, due to external influence, they begun to be made in other forms such as bronze and were lidded. This paper mainly focuses on the lidded vessel (ding). Most of the Bronze forms of the lidded ding originated during the Shang and Zhou dynasties in china around 1523-1028 BC. During this period, the ding had been secularized hence its other purpose included cooking and serving foods and wine apart from the other... Lidded Vessel ...
1 Pages(250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Best Pratices for OS, FW and SELinux for FREE!

Contact Us