Sysadmin Crossword

1234567891011121314151617181920212223
Across
  1. 2. Files typically found in /var/log used for auditing and troubleshooting security events.
  2. 4. A file that contains a list of commands to be run at specified times; audited for persistence.
  3. 6. The core of the OS; security modules like Grsecurity or PaX aim to protect this specifically.
  4. 7. The standard for message logging that separates the generator from the storage.
  5. 11. The conventional name of the user who has all rights or permissions in all modes on Linux.
  6. 12. A cryptographic network protocol for operating network services securely over an unsecured network.
  7. 15. The file that contains basic user information, though not the actual passwords in modern systems.
  8. 16. A custom shortcut for a command; if tampered with, it can be used to intercept sensitive data.
  9. 17. Command used to change the owner and group of a file or directory.
  10. 18. The command or function that determines the default permissions for newly created files.
  11. 21. System configuration file that contains information about all available disk partitions and mount points.
  12. 23. The utility used to change file system access permissions.
Down
  1. 1. A collection of users; permissions can be assigned to this entity to manage access for multiple people.
  2. 3. The user interface for access to an operating system's services; examples include bash, zsh, and sh.
  3. 5. A shell script run every time a new interactive shell starts; often checked for malicious persistence.
  4. 8. The configuration file located at /etc/ that determines which users have super privileges.
  5. 9. The bootloader; securing this prevents unauthorized users from booting into single-user mode.
  6. 10. Command-line utility for querying and displaying logs from systemd-journald.
  7. 12. The specific file in /etc/ that stores encrypted user passwords.
  8. 13. The unique name assigned to a device on a network; changing this is a step in system identification.
  9. 14. The unique numerical identifier assigned by Linux to each user on the system.
  10. 19. A permission bit set on a directory that allows only the item's owner to delete or rename files.
  11. 20. A background process that handles requests for services; often the target of security rules.
  12. 22. Command used to execute programs with the security privileges of another user.