Role of Operating System in Security;For this case assignment you are going to focus on the Fedora security components.;Required;Go to section III of the Red Hat Linux Reference Guide. Also read the Red Hat Linux System Administration Primer and Red Hat Linux Security Guide documents. Read all the sections and work with your Fedora Linux installation. Then answer the following questions and provide evidence you have tested your Linux OS accordingly.;In a 3- to 5-page paper, provide evidence (include conf files when available) of the following;1.How is PAM implemented in your system and why? What is the purpose of PAM and how does it function in your system?;2.Implement and comment on Kerberos in your system. What is its purpose? How is it implemented?;3.What is SSH used for on your system? Does it work? What are its strengths and weaknesses?;4.What is the purpose of IP tables? Develop a configuration which will protect other computers on a LAN from outside intruders and still allow the clients on the LAN to have outside access to FTP, telnet, WWW, and SMTP services. What is the difference between SSH and FTP.;Assignment Expectations;Use information from the modular background readings as well as the given resources. Also, you could use any good quality resource you can find. Please cite all sources and provide a reference list at the end of your paper.;PAPER LENGTH: 3-5 pages and double-spaced.;The following items will be assessed in particular;1.Your ability to consolidate ideas from reading materials and your understanding of the materials.;2.A well written report with strong arguments.;3.Evidence and conf files.
Paper#65142 | Written in 18-Jul-2015Price : $22