issue82:securite
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
issue82:securite [2014/06/09 14:48] – auntiee | issue82:securite [2014/06/27 10:33] (Version actuelle) – auntiee | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
+ | ** | ||
From Michael Lewis: What issues do we have when finding open WIFI in our neighborhoods and in using them? Using a directional antenna the connections are good, fast and usually reliable, but the sources are unknown. What protection would be recommended for everyday use of WIFI , especially for those of us who may pay a bill or order from Ebay using these free sources? | From Michael Lewis: What issues do we have when finding open WIFI in our neighborhoods and in using them? Using a directional antenna the connections are good, fast and usually reliable, but the sources are unknown. What protection would be recommended for everyday use of WIFI , especially for those of us who may pay a bill or order from Ebay using these free sources? | ||
Ligne 5: | Ligne 6: | ||
From John Daniels: How would I go about sending the logs from all workstations and servers to a GNU/Linux box for analysis? What is the best tool to collate the logs from various OSes and formats? | From John Daniels: How would I go about sending the logs from all workstations and servers to a GNU/Linux box for analysis? What is the best tool to collate the logs from various OSes and formats? | ||
- | MB: To correlate and analyze log files, it is preferred to have them stored in a similar way. GNU/Linux systems use syslog for that. While, normally, data is stored only locally in /var/log, most syslog daemons | + | MB: To correlate and analyze log files, it is preferred to have them stored in a similar way. GNU/Linux systems use syslog for that. While, normally, data is stored only locally in /var/log, most syslog daemons can be adjusted to send their data to a (central) remote syslog host. For Windows based systems, there are other solutions; there are also tools which support syslog and send the data in the same way as GNU/Linux machines. After collecting, there are different tools available to work with the data, from log parsing to more advanced event correlation. |
- | can be adjusted to send their data to a (central) remote syslog host. For Windows based systems, there are other solutions; there are also tools which support syslog and send the data in the same way as GNU/Linux machines. After collecting, there are different tools available to work with the data, from log parsing to more advanced event correlation. | + | ** |
+ | Michael Lewis : Quels problèmes a-t-on lorsqu' | ||
+ | |||
+ | MB : Le risque principal avec le WiFi est de transmettre des données dans l'air, puis de les mettre sur le réseau de quelqu' | ||
+ | |||
+ | John Daniels : Comment pourrais-je faire pour envoyer des fichiers journaux de tous les postes de travail et serveurs vers une machine GNU/Linux pour analyse ? Quel est le meilleur outil pour rassembler les journaux de différents systèmes d' | ||
+ | |||
+ | MB : Pour corréler et analyser les fichiers journaux, il est préférable de les avoir stockés d'une manière similaire. Les systèmes GNU/Linux utilisent syslog pour cela. Alors que, normalement, | ||
+ | |||
+ | ** | ||
From SkyAisling: What are your thoughts on UEFI? | From SkyAisling: What are your thoughts on UEFI? | ||
- | MB: As with all standards, they usually take some time to be properly implemented. At this moment, I see many people with a lot of boot issues when setting up dual boot (with GNU/Linux). The idea behind UEFI however is great. If you want to protect a system, all layers have to be protected. UEFI tries to be the glue to avoid | + | MB: As with all standards, they usually take some time to be properly implemented. At this moment, I see many people with a lot of boot issues when setting up dual boot (with GNU/Linux). The idea behind UEFI however is great. If you want to protect a system, all layers have to be protected. UEFI tries to be the glue to avoid malicious code sneaking into the boot process. It’s also this area which is the most important one to watch, because once malware is in, it can start spreading (into memory, OS, etc). |
- | malicious code sneaking into the boot process. It’s also this area which is the most important one to watch, because once malware is in, it can start spreading (into memory, OS, etc). | + | |
From PieterCloete: | From PieterCloete: | ||
- | MB: Normal viruses – like we have seen in the period of MS-DOS – are nowadays not much of a risk. Worms, trojan horses and malicious scripts are still a serious threat to every operating system. Gladly, there aren’t many worms which attack Linux systems. Diversity of Linux systems might be one reason why malicious code might work on | + | MB: Normal viruses – like we have seen in the period of MS-DOS – are nowadays not much of a risk. Worms, trojan horses and malicious scripts are still a serious threat to every operating system. Gladly, there aren’t many worms which attack Linux systems. Diversity of Linux systems might be one reason why malicious code might work on Red Hat, but not on Ubuntu, for example. My advice for making sure a system stays secure is to stay up-to-date with software patches. Perform testing of unknown scripts or new software in a dedicated virtual machine, and audit your system. In all cases, your system is as secure as the weakest link. My tool, Lynis, might help to uncover these areas and provide tips for additional software to keep systems secure. For malware, in particular, you could use tools like ClamAV, Rootkit Hunter, Chkrootkit, OSSEC and LMD. |
- | Red Hat, but not on Ubuntu, for example. My advice for making sure a system stays secure is to stay up-to-date with software patches. Perform testing of unknown scripts or new software in a dedicated virtual machine, and | + | |
- | audit your system. In all cases, your system is as secure as the weakest link. My tool, Lynis, might help to | + | |
- | uncover these areas and provide tips for additional software to keep systems secure. For malware, in particular, you could use tools like ClamAV, Rootkit Hunter, Chkrootkit, OSSEC and LMD. | + | |
Michael Boelen is the author and project lead of Lynis. His company CISOfy provides security guidance to individuals and companies by sharing open source software, support and knowledge. He loves sport, reading, and enjoying life with friends. | Michael Boelen is the author and project lead of Lynis. His company CISOfy provides security guidance to individuals and companies by sharing open source software, support and knowledge. He loves sport, reading, and enjoying life with friends. | ||
+ | ** | ||
+ | |||
+ | SkyAisling : Que pensez-vous de l' | ||
+ | |||
+ | MB : Comme avec toutes les normes, ça prend généralement un certain temps pour être correctement mis en œuvre. En ce moment, je vois beaucoup de gens avec beaucoup de problèmes de démarrage lors de l' | ||
+ | |||
+ | PieterCloete : Quelle est la sécurité de mes systèmes Ubuntu contre les attaques de virus et quel est le meilleur logiciel pour les arrêter, si nécessaire ? | ||
+ | |||
+ | MB : Les virus ordinaires, comme ceux que nous avons vus dans l'ère de MS-DOS, ne présentent aujourd' | ||
+ | |||
+ | |||
+ | Michael Boelen est l' | ||
+ | |||
+ |
issue82/securite.1402318095.txt.gz · Dernière modification : 2014/06/09 14:48 de auntiee