Across
- 2. Files typically found in /var/log used for auditing and troubleshooting security events.
- 4. A file that contains a list of commands to be run at specified times; audited for persistence.
- 6. The core of the OS; security modules like Grsecurity or PaX aim to protect this specifically.
- 7. The standard for message logging that separates the generator from the storage.
- 11. The conventional name of the user who has all rights or permissions in all modes on Linux.
- 12. A cryptographic network protocol for operating network services securely over an unsecured network.
- 15. The file that contains basic user information, though not the actual passwords in modern systems.
- 16. A custom shortcut for a command; if tampered with, it can be used to intercept sensitive data.
- 17. Command used to change the owner and group of a file or directory.
- 18. The command or function that determines the default permissions for newly created files.
- 21. System configuration file that contains information about all available disk partitions and mount points.
- 23. The utility used to change file system access permissions.
Down
- 1. A collection of users; permissions can be assigned to this entity to manage access for multiple people.
- 3. The user interface for access to an operating system's services; examples include bash, zsh, and sh.
- 5. A shell script run every time a new interactive shell starts; often checked for malicious persistence.
- 8. The configuration file located at /etc/ that determines which users have super privileges.
- 9. The bootloader; securing this prevents unauthorized users from booting into single-user mode.
- 10. Command-line utility for querying and displaying logs from systemd-journald.
- 12. The specific file in /etc/ that stores encrypted user passwords.
- 13. The unique name assigned to a device on a network; changing this is a step in system identification.
- 14. The unique numerical identifier assigned by Linux to each user on the system.
- 19. A permission bit set on a directory that allows only the item's owner to delete or rename files.
- 20. A background process that handles requests for services; often the target of security rules.
- 22. Command used to execute programs with the security privileges of another user.
