Národní úložiště šedé literatury Nalezeno 2 záznamů.  Hledání trvalo 0.00 vteřin. 
User rights defined by SELinux technology in Red Hat Enterprise Linux operating system
Končitý, Patrik ; Kubánková, Anna (oponent) ; Komosný, Dan (vedoucí práce)
This thesis deals with the restriction of user rights in the Red Hat Enterprise Linux (GNU/Linux) operating system using SELinux technology. The first part of the thesis explains the mechanisms by which we can restrict rights in the OS. The basic two mechanisms of rights restriction are explained. These mechanisms are Discreet Access Control and Mandatory Access Control. Next, we elaborate on SELinux technology, which is a form of Mandatory Access Control. In the practical part, first a survey of typical OS users and their typical activities is carried out, followed by the implementation part where the theoretical knowledge of SELinux technology is applied. The implementation of new confined users and the templates that are added to each security policy are described. These security policies are then tested on the configured systems to test the mitigation of specific vulnerabilities. Mitigation is successful and the attacker is prevented from gaining privileges. In the last section, we discuss possible future extensions to the security policies.
User rights defined by SELinux technology in Red Hat Enterprise Linux operating system
Končitý, Patrik ; Kubánková, Anna (oponent) ; Komosný, Dan (vedoucí práce)
This thesis deals with the restriction of user rights in the Red Hat Enterprise Linux (GNU/Linux) operating system using SELinux technology. The first part of the thesis explains the mechanisms by which we can restrict rights in the OS. The basic two mechanisms of rights restriction are explained. These mechanisms are Discreet Access Control and Mandatory Access Control. Next, we elaborate on SELinux technology, which is a form of Mandatory Access Control. In the practical part, first a survey of typical OS users and their typical activities is carried out, followed by the implementation part where the theoretical knowledge of SELinux technology is applied. The implementation of new confined users and the templates that are added to each security policy are described. These security policies are then tested on the configured systems to test the mitigation of specific vulnerabilities. Mitigation is successful and the attacker is prevented from gaining privileges. In the last section, we discuss possible future extensions to the security policies.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.