Národní úložiště šedé literatury Nalezeno 2 záznamů.  Hledání trvalo 0.00 vteřin. 
Security of Red Hat Enterprise Linux based operating systems
Kňažeková, Nikola ; Ilgner, Petr (oponent) ; Komosný, Dan (vedoucí práce)
This master’s thesis focuses on increasing the security of Red Hat Enterprise Linux derived operating systems, based on the vulnerabilities analyzed over the last 5 years. The theoretical part describes the weaknesses and vulnerabilities, and the basic security mechanisms in Linux, with a focus on a SELinux technology. SELinux technology is shipped with the operating systems Red Hat Enterprise Linux, Fedora, and CentOS. In the practical part, based on the analyzed vulnerabilities, the configuration of the SELinux technology was designed. The design describes the elements that will be configured, namely SELinux booleans, SELinux modules, and SELinux users, focused on memory protection, escalation of privileges, code execution, data leakage, and restriction of processes and users. Based on the suggestions, a configuration was created in the Ansible configuration tool, which aims to allow the user to simply and quickly configure systems. In addition, two more configurations have been created that will allow users to revert the SELinux configuration to a previous state or lockdown the SELinux configuration. Subsequently, the impact of the configurations on the usability of the system was verified, and the found bugs were fixed or reported. The last part verifies the functionality of the configuration against exploit vulnerabilities.
Security of Red Hat Enterprise Linux based operating systems
Kňažeková, Nikola ; Ilgner, Petr (oponent) ; Komosný, Dan (vedoucí práce)
This master’s thesis focuses on increasing the security of Red Hat Enterprise Linux derived operating systems, based on the vulnerabilities analyzed over the last 5 years. The theoretical part describes the weaknesses and vulnerabilities, and the basic security mechanisms in Linux, with a focus on a SELinux technology. SELinux technology is shipped with the operating systems Red Hat Enterprise Linux, Fedora, and CentOS. In the practical part, based on the analyzed vulnerabilities, the configuration of the SELinux technology was designed. The design describes the elements that will be configured, namely SELinux booleans, SELinux modules, and SELinux users, focused on memory protection, escalation of privileges, code execution, data leakage, and restriction of processes and users. Based on the suggestions, a configuration was created in the Ansible configuration tool, which aims to allow the user to simply and quickly configure systems. In addition, two more configurations have been created that will allow users to revert the SELinux configuration to a previous state or lockdown the SELinux configuration. Subsequently, the impact of the configurations on the usability of the system was verified, and the found bugs were fixed or reported. The last part verifies the functionality of the configuration against exploit vulnerabilities.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.