安徽省商品住宅销售Title.pptx

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Building Your IT Security Checklist;What have we just done?;Applying TBS to the real world!;The TBS Audit Layers;CIS Rulers;CIS Rulers: A Security and Audit Checklist;CIS Rulers: Security Checklist Audit Plan;CIS Rulers: Procedural;CIS Ruler: Procedural;CIS Ruler Example: Backups;CIS Ruler: Procedural;CIS Ruler: Procedural;CIS Ruler: Written Documentation, Policies;CIS Ruler Example: Security Policy;CIS Ruler:;Procedural: Incident Response Plan ;Procedural: Training Education;Procedural: Physical Security;Procedural: Windows 2000;Procedural: Windows 2000;CIS Procedural Ruler Review;CIS Rulers for Solaris and Linux;CIS Level 1 Ruler: Unix;CIS Level 1 Ruler: Unix;CIS Level 1 Ruler: Unix;CIS Level 1 Unix Ruler - Patches;CIS Level 1 Unix Ruler: Security Tools;CIS Level 1 Unix Ruler: Security Tools;CIS Level 1 Unix Ruler: Access, Authorization;CIS Level 1 Unix Ruler: Kernel TCP/IP Tuning;CIS Level 1 Unix Ruler: Kernel , Batch Utilities;CIS Level 1 Unix Ruler: UMASK, , Access;CIS Level 1 Unix Ruler: and Access;See what we can find;Audit Report Example;/dev Permissions Exhibit;World-Writeable and SUID/SGID Files Audit Method Find commands were executed on the servers to locate all files with world-writeable permissions and SUID/SGID permissions. The output was redirected to appropriate files for later analysis. ? Finding A large number of world-writeable and SUID/SGID files were found on the server XYZ. Further, a number of files in the /usr, /opt and /var directories allow all users to have write permission. ? Security Implication World-writeable files allow any user or an intruder to change the contents of a file, effecting information integrity. Also, for executable files, an intruder may replace the a trojan horse that can damage the system and its integrity. SUID/SGID files execute with the privilege of the owner/group. These can be subverted by an unauthorized user or intruder to escalate their privilege to those of the owner/group of the SUID/SGID file.

文档评论(0)

ayangjiayu3 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档