...1) Lewis defines black male privilege as a set of often overlooked and unearned gender-related advantages that centers the experience and concerns of black men to the exclusion of others in the black community, particularly women. Black men often find it difficult to see their privilege because often times they are more focused on where they may be oppressed and underprivileged. Because black men see that they are constantly having issues in society because they are black and women are black as well – they forget they still are slightly above them on the totem poll. In some ways, white feminist and black men are similar in not realizing their privilege because they are both underprivileged in many ways. I do feel as thought white feminist should be able to understand or at least notice the gap in privilege more so than black men just because it’s a stark difference. In order to for black men to become more conscious, they have to understand that they can be oppressed in one light but still less oppressed than another...
Words: 570 - Pages: 3
...“White Privilege” Topic: McIntosh, Peggy “White Privilege” The author made use of the phenomenon of male privilege to bring out the fact that white privilege is similarly denied and unconsciously protected. By describing how male privilege has rooted in our society, and how men denied this phenomenon by avoiding acknowledgement of the issue, the author explained the development of white privilege. According to the author, whites are taught not to recognize their privileges. They are disciplined in a way that they are unable to recognize racism as something that puts them at an advantage while as a result, put others at a disadvantage. They do not realize the existence of unearned skin privilege and therefore do not feel the need to stop it. By identifying the daily experiences granted by their skin privilege, whites can help themselves to reveal this distorted culture. They have to recognize the problem before they can lessen it and work to end it. The most obvious privileges are that white individuals are assumed to be affluence, civilized and morally neutral. The white community is perceived as a group of people who interact pleasantly and peacefully and that their country enjoys a widely represented state and its people enjoy many of its freedom. These perceived and unearned privileges are not only preserved from other people, they are also used as weapons to oppress others. However, even if white individuals do not approve the way which white dominance has been...
Words: 328 - Pages: 2
...Secure Computing Corporation, Trusted Computer Solutions, and Tresys Technology. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. SELinux also adds finer granularity to access controls. Instead of only being able to specify who can read, write or execute a file, for example, SELinux lets you specify who can unlink, append only, move a file and so on. SELinux allows you to specify access to many resources other than files as well, such as network resources and interprocess communication. A Linux kernel integrating SELinux enforces mandatory access-control policies that confine user programs and system servers to the minimum amount of privilege they require to do their jobs. This reduces or eliminates the ability of these programs and daemons to cause harm when compromised. This confinement mechanism operates independently of the traditional Linux access control...
Words: 1252 - Pages: 6
...Linux Security Basics Security is always at the top of the list when setting up a network and also administering a network. Linux is an operating system that can be easily obtained over the internet due to its open source distributions. Linux is one of the most secure operating systems because of having less use than Windows for the end user. There are several security technologies in Linux that can be implemented into a network. The three technologies that I will be discussing are SELinux, chroot jail, and iptables. SELinux was developed by the National Security Administration in an effort to incorporate a strong, flexible mandatory access control architecture into the major subsystems of the Linux kernel. The NSA recognized that operating system security is critical at higher levels. It provides a tool to enforce the separation of information based on the confidentiality and integrity requirements. This helps when addressing threats of tampering and bypassing of application security. It also assists in the isolation of damage that is caused by malicious software or damaged applications. SELinux uses the Flux Advanced Security Kernel which contains components that provide support for enforcing many kinds of MAC policies like type enforcement, role-based access control, and multilevel security. The Linux kernel that is implementing SELinux enforces MAC policies that limit the user programs and system servers to only what they need to complete the job. When a limit...
Words: 1313 - Pages: 6
...IT302 Linux Administration Research #1 I researched three Linux security technologies which are, SELinux, chroot jail and iptables. As you read into this research you will see that they are split up into their own catagories so that it is easy to read information on whichever topic you would like. SELinux As part of its Information Assurance mission, the National Security Agency has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. Recognizing the critical role of operating system security mechanisms in supporting security at higher levels, researchers from NSA's National Information Assurance Research Laboratory have been investigating an architecture that can provide the necessary security functionality in a manner that can meet the security needs of a wide range of computing environments. End systems must be able to enforce the separation of information based on confidentiality and integrity requirements to provide system security. Operating system security mechanisms are the foundation for ensuring such separation. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. As a consequence, application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several...
Words: 1295 - Pages: 6
..............................................................3 I. Exploiting XP .........................................................................................................................................................4 II. Exploiting Ubuntu ...............................................................................................................................................20 Summary ......................................................................................................................................................................39 1 CHAPTER 13 2 CHAPTER 13 Introduction In the post-exploitation phase, we will look at information gathering on the exploited systems, privilege escalation. Perhaps we’ll find that we can access sensitive data stored on the exploited system. Maybe the exploited system is part of a domain, and we can use it to access other systems on the domain. These are just a few of the potential avenues open to us in post exploitation. Post exploitation is arguably the most important way to get a clear picture of a client’s security posture. 3 CHAPTER 13 I. Exploiting XP Kalis IP Address 4 CHAPTER 13 Windows XP IP Address 5 CHAPTER 13 Starting metasploit 6 CHAPTER 13 Stablished link again from lab 8 to continue this lab 7 CHAPTER 13 Showing help upload 8 CHAPTER 13 Uploading file to C: drive 9 CHAPTER 13 Showing name...
Words: 857 - Pages: 4
...understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before the SElinux policy during access attempts. If the standard permissions deny access the access is denied so therefore SElinux is not involved. When the standard file permissions do allow access, the SElinux policy will be consulted and access is either gained or denied based on the security contexts of...
Words: 938 - Pages: 4
...are used to configure TCP Wrappers? host.allow and hosts.deny (e) What keyword in TCP Wrappers matches any daemon or client? All or Exact (f) Given the following entry in TCP Wrappers what will happen when a client address 172.16.24.100 tries to access a Web site running on this server? The IP matches both the access and deny hosts files. It will be allowed access because it matches the first hosts file that is checked. (g) What is a chroot jail? It is a process with a root directory other than /. Say you run a process or program and specify its root as /home/sam/jail, it would have no knowledge of any files above /home/sam. Jail is the root directory. (h) When might a chroot jail not work? Running a chroot utility with root privileges, and also using su or sudo programs. Those are compiled for Fedora/REEL and they call PAM, you would have to modify the source so it does not call PAM. Either one could lead to an unsecure jail. (i) What is the name of the kernel component that uses the iptables rules to filter network traffic? Netfilter 2. Create an iptables rule that will block all traffic from 10.14.34.207 and not let the sender know that the traffic was blocked. #...
Words: 345 - Pages: 2
...Chapter 18 Exercises 1.What is the difference between the scp and sftp utilities? copies file to and from a remote system SFTP is the same but is secure 2.How can you use ssh to find out who is logged in on a remote system? Assuming you have the same username on both systems, the following command might prompt you for your password on the remote system; it displays the output of who run on host: $ ssh host who 3.How would you use scp to copy your ~/.bashrc file from the system named plum to the local system? $ scp ~/.bashrc zack@plum: 4.How would you use ssh to run xterm on plum and show the display on the local system? Assuming you have the same username on both systems and an X11 server running locally, the following command runs xterm on plum and presents the display on the local system: $ ssh plum xterm You need to use the –Y option if trusted X11 forwarding is not enabled. 5.What problem can enabling compression present when you are using ssh to run remote X applications on a local display? When using compression latency is increased and the outcome is always undesirable slower speeds, and data interruption. 6.When you try to connect to a remote system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened?What should you do? This message indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check with the remote system’s...
Words: 1325 - Pages: 6
...still have to reference hard-coded mappings between IP addresses and host names 4. What does the /etc/resolv.conf file do? The /etc/resolv.conf file is the resolver configuration file. It provides access to DNS for Internet address resolution. The nameserver line indicates which systems the local system should query to resolve hostnames into IP addresses, and vice versa. 5. How would you mount an ISO image so that you could copy files from it without burning it to a CD? $ mount -t -o loop image.iso /mnt/image 6. Why are setuid shell scripts inherently unsafe? A normal user acquires root priveleges. So, those commands are dangerous. 7. Some older kernels contain a vulnerability that allows a local user to gain root privileges. Explain how this kind of vulnerability negates the value of a chroot jail. 8. What does FIFO stand for? First in first...
Words: 305 - Pages: 2
...understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before the SElinux policy during access attempts. If the standard permissions deny access the access is denied so therefore SElinux is not involved. When the standard file permissions do allow access, the SElinux policy will be consulted and access is either gained or denied based on the security contexts of...
Words: 940 - Pages: 4
...Focus on Pellow's discussion of stakeholders and ways in which companies maneuver to obtain approval and minimize opposition. How do these strategies connect to "colonial" hierarchies and institutionalized racism? As Pellow states, the causes of environmental injustice referenced in the scholarly literature include institutional racism in housing… and the exclusion of low-income individuals and people of color from the dominant environmental movement” (Pellow, 13). And the environmental inequality is a social process involving and impacting many stakeholders, such as social movement organizations, private sector firms, the state, residents, and workers. “When different stakeholders struggle for access to valuable resources within the political economy, the benefits and costs of those resources become distributed unevenly” (Pellow, 14). Which means that, those stakeholders with less power suffers from environmental inequality, such as living and working under dangerous conditions; those stakeholders with greater power are able to deprive other stakeholders. Thus, workers and residents with minimal political power are the most vulnerable to environmental inequality. In order to obtain approval and minimize opposition, companies adopt many strategies, which are connected to "colonial" hierarchies and institutionalized racism. “Throughout history, one of the most effective ways of controlling a colony was to create hierarchies (or intensify existing ones) between social classes...
Words: 373 - Pages: 2
...identity are interchangeable. It is important to educate people in the clear definitions of these terms since, contrary to popular belief, they are not in any way at all interchangeable. The main difference that seems difficult to understand is the difference between sex and gender. As a sexually dimorphic society, we recognize differences between sexes. Sex is determined by the biology we are born with and is sorted into either of two strict pillars according to our genitalia - male or female. Gender is a socio-cultural construct that assigns certain roles, stereotypes and expectations to each sex. Humans with female characteristics are “girls” or “women” and humans with male characteristics are “boys” or “men.” The terms sex and gender are not interchangeable at all. When we are born, doctors assign our sex to correspond with what they see. When our gender does not align to our physical appearance, bewilderment ensues. Its important to shine light on the existence of other genders, not just female and male. When a child is born, a quick glance between the legs determines the gender label that the child will carry for life. Since birth we are taught how we should act according to our culture’s constructs and norms. Pink clothes for the newborn baby girl and blue clothes for the newborn baby boy. When our internal gender identity does not find a place to fit in within the two acknowledged genders, we become confused. Gender identity is a person's private sense and subjective experience...
Words: 880 - Pages: 4
...ever there were one, but is The Bell Jar a feminist novel? There are some feminist innuendoes. Jay Cee is a heroic feminist figure, named by her initials in the American business fashion and in her 'strict business suit' and 'luncheon ticket hat'. She has 'brains' to make up for her 'plug-ugly' looks in comparison with the archetypal male Buddy Willard who is 'stupid' although he can 'get good marks all right'. And there is an implied resentment that men have certain privileges denied to women. Only a boy baby may have the privilege of peeing in a doctor's face. Teresa, Dr Quinn and Dr Nolan can be doctors and Joan can aspire to be a psychiatrist but only Dr Gordon can charge twenty-five dollars an hour. Esther could have taken a medical degree if she had not 'dodged chemistry' but her degree in English is of no value without a knowledge of shorthand to enable her to be an acolyte of a man. Esther would have liked to have been a translator but her brother is the one allowed to go to Germany to learn the language. Only in the liberalised Soviet Union can we find a woman translator. An exceptional occasion where a woman is allowed into a male domain is where Buddy Willard, suffering from the aftermath of T B, is unable to perform the masculine task of shovelling snow and Esther is obliged to perform the task for him. The case for women being...
Words: 995 - Pages: 4
...Male entitlement. Oh what a wonderful privilege. Throughout history men have been bestowed with wonderful blessings and liberties that have not been afforded to women. In recent times, the playing field has leveled off quite a bit, but one aspect that has not changed, is the self-assured entitlement of men. Now before I scare too many of you off with that rather blunt statement, I must stay that I recognize the progressive changes that have already been made and that as with any gender topic, it is dangerous to make widespread generalizations about one gender. But I must also argue that it is naive to ignore the fact that male entitlement is a concerning and pervasive issue in our society. I’d also like to recognize that yes male entitlement...
Words: 871 - Pages: 4