PAM, Process Management, and Security Mechanisms in Linux

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

These flashcards cover essential vocabulary from the lecture on PAM, process management, security measures, and logging in Linux.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

PAM

A suite of shared libraries allowing system administrators to choose how applications authenticate users.

2
New cards

Modularity

The capability of PAM to allow different authentication methods to be plugged into the system without changing application code.

3
New cards

Centralized Management

PAM's ability to manage and update authentication policies across multiple applications.

4
New cards

PAM Configuration Files

Files that define authentication policies for applications using PAM, typically located in /etc/pam.d/.

5
New cards

Common PAM Modules

Includes modules like pamunix.so for standard Unix authentication or pamgoogle_authenticator.so for two-factor authentication.

6
New cards

Process ID (PID)

A unique identifier for each process in Linux.

7
New cards

fork()

A system call used to create a new process by duplicating the calling (parent) process.

8
New cards

exec()

A system call used to replace a process's memory space with a new program.

9
New cards

Process States

Include running, sleeping, stopped, zombie, and orphan.

10
New cards

Inter-Process Communication (IPC)

Mechanisms that allow processes to communicate or share data, such as pipes or sockets.

11
New cards

Systemd

A system and service manager for Linux operating systems, often used as the default init system.

12
New cards

Security Context

Used in SELinux to determine what a process can do by assigning a label that contains user, role, type, and level.

13
New cards

iptables

A powerful firewall tool in Linux used to control network traffic at the packet level.

14
New cards

Firewalld

A dynamic firewall management tool that uses zones to define trust levels for network connections.

15
New cards

UFW (Uncomplicated Firewall)

A user-friendly front-end for managing iptables rules in Linux.

16
New cards

Logwatch

A log analysis tool that compiles summaries of various logs for system monitoring.

17
New cards

Rsyslog

An enhanced version of the syslog protocol used for forwarding log messages across a network.

18
New cards

SSH (Secure Shell)

A protocol for securely accessing network services over an unsecured network.

19
New cards

Key-based Authentication

A method of SSH authentication relying on a pair of cryptographic keys for enhanced security.

20
New cards

SELinux Modes

SELinux operates in three modes: enforcing, permissive, and disabled.

21
New cards

Samba

An open-source software suite that enables file and print sharing between Windows and Unix/Linux systems.