Thursday, November 28, 2019

Linux Security Technologies free essay sample

In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting. To better understand what improvements Mandatory Access Control (MAC) can provide for security, one needs to know about the standard Linux security provision called Discretionary Access Control (DAC). DAC, though it is still a form of security, only provides minimal protection to a Linux file system. We will write a custom essay sample on Linux Security Technologies or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page With DAC, access to files merely requires needed permissions from the owner of the file to access (commonly referred to as file permissions), often requiring a password to open. A basic weakness of DAC is not being able to fundamentally differentiate between human users and computer programs. And with so many systems often having such large numbers of users, it only takes hackers accessing a single user’s account to have access to any and all of the files they have permissions for. If the compromised user account were to have super-user (root) access, the hacker could then gain access to an entire file system. This became the basis for coming up with a more secure way of protecting wrongful access into standard Linux based systems. SELinux utilizing MAC, on the other hand, was created to address this very weakness that DAC has as the standard Linux security. The way MAC helps improve overall security of SELinux is by providing what is called granular permissions for every subject (user, program, process) and object (file, device). In other words, through MAC, you only grant any subject the specific object or objects required to perform a specific function, and no more. Compared to DAC, security is more compartmentalized and has more layers of protection. Hence, SELinux provides a much more secure environment than the original Linux security features alone can. Another feature providing further security for a network is TCP Wrappers. TCP Wrappers work by controlling access through the utilization of IP addresses. In Linux, this is accomplished through 2 specific files that need to be created. The first file, hosts. deny, is a file listing names of hosts that are to be denied access to the network. The second file, hosts. allow is a file listing the names of hosts that are allowed access to the same network. The absence of theses 2 files, would allow the entire Internet access to network services, severely lowering the security of a host. This lowers a system being compromised through a sort of â€Å"gate guard with an access list† policy. If your name appears on the list, you gain access; if it’s not, you don’t. Creating an artificial root directory is yet another way to provide security for Linux systems, and is commonly referred to as a chroot jail. This prevents accessing or modifying, possibly maliciously, any file outside the directory hierarchy. The command required to create a chroot jail is /usr/sbin/chroot. Note, you must be working as root inside the Linux shell to do this. By creating a chroot jail, it prevents users from navigating up the hierarchy as high as possibly â€Å"/† (root). Even if the user did not have permissions required to edit higher directories, they may still be able to see files they don’t have any reason to have any access to. Chroot can be useful for providing basic preventative security by making it more difficult to exploit information on a server. But, by limiting user access in this way, if a user account were ever hacked, it still provides yet another layer of security by limiting the amount of access each user account has to begin with. It is important to understand that you must run a program in chroot jail as a user other than root (/). This is because root can break out of jail, making the chroot jail not provide the security it is intended to against unwanted access. Setting up iptables is another form of network security in Linux. They allow for setting up a firewall on the network. Iptables allow for network packet filtering rules. The use of iptables function allows rules to be set up that can reject inbound packets opening new connections and accept inbound packets that are responses to locally initiated connections. This basic feature therefore acts as a firewall to the system, preventing unwanted outside attempts to hack into a host network. In conclusion, with the technological direction of our future apparent, security technologies will be a continuing issue that will never stop making further advances. After all, the financial, physical, and ideological future of our country, and people as a whole, cannot afford to do otherwise. As our children, and children’s children, begin to take the reins of this electronically motivated world, computer security technologies will continue to be an important issue as long as we continue as a society. References: * http://www. omnisecu. om/gnu-linux/redhat-certified-engineer-rhce/what-is-security-enhanced-linux-selinux. htm * http://fedoraproject. org/wiki/SELinux_FAQ * http://www. nsa. gov/research/_files/selinux/papers/x/img3. shtml * http://docs. redhat. com/docs/en-US/Red_Hat_Enterprise_Linux/4/html/SELinux_Guide/selg-preface-0011. html * http://docs. fedoraproject. org/en-US/Fedora/13/html/SELinux_FAQ/ * http://www. bu. edu/tech/security/firewalls/host/tcpwrappers_macos x/ * http://www. serverschool. com/dedicated-servers/what-is-a-chroot-jail/ * http://en. wikipedia. org/wiki/Chroot

Sunday, November 24, 2019

Free Essays on Movado

Marketing Research – Mavado Group, Inc Movado Group, Inc. is a publicly-owned, international company traded on the New York Stock Exchange under MOV. The Paramus, New Jersey-based company designs, makes and distribures watches. Movado family of brands collectively competes in the watch industry’s moderate through luxury price categories. The company’s trade customers include department stores, jewelry store chains and independent jewlers, many of which sell more than one of Movado Group’s brands. In addition, the firm’s retail division includes five prestige boutiques and 24 outlet stores in the United States. Each of the company’s core watch brands: Concord, Movado and ESQ remain strong with each brand’s styling and advertising targeted at diverse consumer and price segments. Concord has received strong acceptance in the luxury market, offering a good value. The Movado line, which includes widely recognized Museum Watch Dial, continues to appeal to sophisticated customers; while the modeerately priced ESQ watch attracts younger consumers with an active lifestyle. Movado has a strong history of success in launching new brands. The launch of the Coach brand has been described as the most exciting watch brand launch ever, with first year sales exceeding $16 million. The company’s ESQ line has remained strong since it was introduced in 1992 and the introduction of the Movado Vizio line was considered highly successful. The company has recently signed an exclusive license with the Tommy Hilfiger Corportation, to develop and distribute a watch brand. Movado launched its Movado Boutique concept in 1998, with each store carrying exclusively-designed custom jewelry, tabletop accessories, home decorative objects, as well as watches. Movado also signed a license agreement with Linden Clocks, a leading maker, to develop, produce and distribute a line of Movado clocks, and a separate agreement with Lantis Eyew... Free Essays on Movado Free Essays on Movado Marketing Research – Mavado Group, Inc Movado Group, Inc. is a publicly-owned, international company traded on the New York Stock Exchange under MOV. The Paramus, New Jersey-based company designs, makes and distribures watches. Movado family of brands collectively competes in the watch industry’s moderate through luxury price categories. The company’s trade customers include department stores, jewelry store chains and independent jewlers, many of which sell more than one of Movado Group’s brands. In addition, the firm’s retail division includes five prestige boutiques and 24 outlet stores in the United States. Each of the company’s core watch brands: Concord, Movado and ESQ remain strong with each brand’s styling and advertising targeted at diverse consumer and price segments. Concord has received strong acceptance in the luxury market, offering a good value. The Movado line, which includes widely recognized Museum Watch Dial, continues to appeal to sophisticated customers; while the modeerately priced ESQ watch attracts younger consumers with an active lifestyle. Movado has a strong history of success in launching new brands. The launch of the Coach brand has been described as the most exciting watch brand launch ever, with first year sales exceeding $16 million. The company’s ESQ line has remained strong since it was introduced in 1992 and the introduction of the Movado Vizio line was considered highly successful. The company has recently signed an exclusive license with the Tommy Hilfiger Corportation, to develop and distribute a watch brand. Movado launched its Movado Boutique concept in 1998, with each store carrying exclusively-designed custom jewelry, tabletop accessories, home decorative objects, as well as watches. Movado also signed a license agreement with Linden Clocks, a leading maker, to develop, produce and distribute a line of Movado clocks, and a separate agreement with Lantis Eyew...

Thursday, November 21, 2019

Project Management. Zeropain Project case Essay

Project Management. Zeropain Project case - Essay Example Acquisitions offer one of the quickest ways for a company to grow and improve performance; they also represent the largest area of risk taking. The acquisition of Teutonia Pharma AG by Alpex was a case of a ‘horizontal’ (DePamphilis, 2002, p7) acquisition where both companies were in the same line of business with the intent of finding operational synergy and an effort to diversify into higher growth products and markets. The fact that Teutonia owned a licence from CPW for the European market made it an attractive preposition for Alpex. However, Alpex paid a premium on the basis of sales projections of a product which was not even tested by the original manufacturer. Roll (1986) argues that takeover gains are overestimated, if they exist at all. Any bids made over the market price represent an error and are made on the basis of an overbearing presumption by the bidders that their valuation is correct. The entire handling of Zeropain represents an attempt to justify the acquisition. The basic rules for the testing, positioning, promotion, and launch of a product were ignored by Alpex management – to disastrous consequences. New products are the ‘lifeblood of the research-intensive pharmaceutical industry’ (Taylor et al, 2002, p106-7). Given the huge cost of development, in this case the premium paid, and limitations placed on patent protection at the time of approval for marketing, the need to bring products to market quickly is very real