Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Security Control Selection: Addressing the Dirty Pipe Vulnerability in Linux Systems, Assignments of Computer Networks

A case study on the dirty pipe vulnerability in linux systems, focusing on wells fargo's security concerns. It analyzes alternative security controls, including patching, centralized package management, and built-in security measures. The document also evaluates the effectiveness of current protocols for patching, critical patching, monitoring, and physical security, highlighting potential challenges and overall benefits.

Typology: Assignments

2024/2025

Available from 02/17/2025

Milestonee
Milestonee 🇺🇸

4.4

(22)

3.5K documents

1 / 11

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Keller Graduate School
SEC571
Week 4
Security Control Selection
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download Security Control Selection: Addressing the Dirty Pipe Vulnerability in Linux Systems and more Assignments Computer Networks in PDF only on Docsity!

Keller Graduate School

S E C 571

Week 4

Security Control Selection

Problem Stateme nt

  • A significant concern for Wells Fargo is the Dirty Pipe vulnerability in their Linux system. This flaw can be exploited to gain unauthorized user privileges, allowing attackers to manipulate apps and deceive the Linux pipes application into inserting their data into the system. The most alarming consequence is the potential for attackers to gain full access to a user's system, posing a severe threat to the system's security.

Qualitativ e Analysis

  • (^) It is imperative that all systems, without exception, receive the necessary patches. This comprehensive approach ensures that all potential vulnerabilities are addressed and all patches and modifications are filed and kept on record for thoroughness.

Security Control Selection

  • (^) It is essential to promptly apply patches to the current version of Linux to fix the dirty pipe vulnerability as soon as they are released. We can rest assured that Linux distributions are regularly updated, ensuring the security of our system. Some older distros may only receive updates if we are proficient Linux experts who can obtain and install them. However, popular Linux varieties like Debian, Ubuntu, and Mint receive timely updates.

Qualitative Analysis

Administrative

Patching Operation: Current Protocol

  • (^) Cost: extended time commitment
  • (^) Availability: Heightened Potential Implementation Challenges: There is a possibility of missing pop-up notifications during the patching process. Overall: Ensures that servers remain up to date to mitigate potential risks. Critical Patching Operation: Existing Protocol
  • (^) Cost: extended time requirement
  • (^) Availability: Moderate Overall, attackers have minimal time to exploit potential vulnerabilities.

Qualitative Analysis Technical

Patching Procedure: Current process Duration: Extended hours Availability: Increased The most significant challenges encountered during the patch relate to performance issues. Overall: Revised patches will help reduce risks. Monitoring Procedure: Integration into the system Cost: Training, extended hours, equipment expenses Availability: When instruments are in use, and data is being captured Implementation challenges: Understanding where to log reports and how to monitor parse logs Overall: Continuous monitoring will provide insights into potential system changes.

Risk Matri x Chart

Reference s Hamedan, A. F. (2023, 07 04). eD ISS Retrieved_._^ from^ https://ediss.uni- goettingen.de/handle/11858/ 28 Warren-Kachelein, D. (2022, March 7). Bank Info Security. Retrieved from https:// www.bankinfosecurity.com/dirty-pipe- permission-flaw-detected-in-linux-os- kernel-a- 18672 Wells Fargo. (2024). Retrieved from https:// www.wellsfargo.com/about/