Case Project 8-1: Securing an Older Linux OS
After conductin" rel="nofollow">ing footprin" rel="nofollow">intin" rel="nofollow">ing and usin" rel="nofollow">ing social-engin" rel="nofollow">ineerin" rel="nofollow">ing techniques on the Alexander Rocco network, you have determin" rel="nofollow">ined that the company is runnin" rel="nofollow">ing several applications on Lin" rel="nofollow">inux computers. You also discover that the payroll system runs on several Red Hat Enterprise Lin" rel="nofollow">inux 3 (RHEL 3) servers. You need to ensure that this version will be supported with patches from the vendor until the new payroll system is in" rel="nofollow">installed in" rel="nofollow">in 2011. Based on this in" rel="nofollow">information, write a brief report statin" rel="nofollow">ing whether the systems can be secured until they’re replaced in" rel="nofollow">in 2011, and in" rel="nofollow">include recommendations for securin" rel="nofollow">ing these systems.
After you are done with writin" rel="nofollow">ing the memo. I want you to answer the followin" rel="nofollow">ing questions.
1- Many argue that Win" rel="nofollow">indows systems only appear to be the most vulnerable systems because they have more of the market share. Do you agree or disagree with this statement? Why?
2- SCADA systems are used for critical in" rel="nofollow">infrastructure systems. Research various applications of SCADA systems today. Can you fin" rel="nofollow">ind a SCADA system that has been damaged? If so, what were the consequences?
NOTE: Don’t in" rel="nofollow">include the question in" rel="nofollow">in the memo. Just answer it by itself separately from the memo