Patch and Software Management CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Two Downloading and Installing Software.
Advertisements

WHO WILL BENEFIT FROM THIS TALK TOPICS WHAT YOU’LL LEAVE WITH Server Application, Device and System vendors that wish to participate in the Software and.
Raymond R. Balise Health Research and Policy
System Center Configuration Manager Push Software By, Teresa Behm.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
Patch Management In Solaris and Red Hat. What is a Patch A collection of fixes to a problem Three main categories: Security Bugs in the system that provide.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
A Tour of System Center Configuration Manager Adam Duffy Edina Public Schools.
How To Keep Up With Security Patches Eric Schultze Security Strategies Microsoft.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
Group Policy in Microsoft Windows Active Directory.
Patch Management Strategy
IT:Network:Microsoft Applications
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Computer Concepts – Illustrated 8 th edition Unit C: Computer Software.
1 Modular Software/ Component Software 2 Modular Software Code developed in modules. Modules can then be linked together to produce finished product/program.
Microsoft Installer Technologies and patch management approaches.
Learning In A Techno World How Safe is Your Cyberspace?
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Overview of Linux Dr. Michael L. Collard 1.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Introduction to System Administration CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
OS Installing CSCI N321 – System and Network Administration Copyright © 2000, 2012 by Scott Orr and the Trustees of Indiana University.
Installing and Supporting IDX Flowcast™ Web Desktops Alan Beckwith and Pete Chunis, Flowcast Development.
Install Software. UNIX Shell The UNIX/LINUX shell is a program important part of a Unix system. interface between the user & UNIX kernel starts running.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 8: Installing Software in Linux Chapter 13: Downloading and Installing Software By Fred R.
Course Information CSCI N321 – System and Network Administration Copyright © 2011, 2012 by Scott Orr and the Trustees of Indiana University.
11 SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL Chapter 9.
XP Practical PC, 3e Chapter 3 1 Installing and Learning Software.
IT320 OPERATING SYSTEM CONCEPTS Unit 3: Welcome to Linux June 2011 Kaplan University 1.
IT320 OPERATING SYSTEM CONCEPTS Unit 3: Welcome to Linux September 2012 Kaplan University 1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Deploying Software with Group Policy Chapter Twelve.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
NETWORKING & SYSTEM UPDATES
RedHat Package Management RPM and YUM in RedHat Enterprise, Fedora, Suse and Centos.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
SCD Monthly Projects Meeting 2014 Scientific Linux Update Rennie Scott January 14, 2014.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Copyright © PatchLink ® 2003 All Rights Reserved Server Installation.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
6/14/20161 System Administration 1-Introduction to System Administration.
Tuque Automated Software Distribution System By Erick Engelke.
FermiLinux STS Scientific Linux 6 Connie Sieh HEPIX Spring 2009 May 25, 2009.
The firmware-tools project Matt Domsch Michael Brown.
New Tools Used by the Scientific Linux Team
SharePoint 101 – An Overview of SharePoint 2010, 2013 and Office 365
IT320 Operating System Concepts
COP 4343 Unix System Administration
Software Packaging and Releasing
CompTIA Server+ Certification (Exam SK0-004)
IBM Tivoli Provisioning Manager Red Hat 5 patch management
Get the Most Out of GoAnywhere: Agents
Automated Update System
Spacewalk and Koji at Fermilab
Maintaining software solutions
EMI: dal Produttore al Consumatore
RedHat Package Management
Chapter 9 MANAGING SOFTWARE.
Introduction to System Administration
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Chapter 10: Supporting and Maintaining Desktop Applications
Getting Started.
Figure 6-4: Installation and Patching
Getting Started.
OPS235 PACKAGE MANAGEMENT
Course Information CSCI N321 – System and Network Administration
Presentation transcript:

Patch and Software Management CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University

Section Overview Software bugs Patching Approaches Software Installation Software Inventory and Removal

References RedHat Fedora 15 Installation Guide RedHat Fedora Support – Documentation

It’s a bug’s life… Source: History of Computing History of ComputingHistory of Computing Virginia Tech U.S. Navy Capt. Grace Hopper finds first computer bug in August, 1945 From Hopper’s logbook From Hopper’s logbook

Computer Bugs Bug (n): An unwanted and unintended property of a program or piece of hardware, esp. one that causes it to malfunction. * Security related issues Coredumps Unauthorized access * Source: The New Hackers Dictionary The New Hackers DictionaryThe New Hackers Dictionary

Software Patches Fix bugs discovered after version release Notification Vendor lists Security Announcements (i.e. CERT) Software Auditing Agents (i.e. Secunia PSI) Automated systems Fedora & RedHat: yum update Microsoft: Windows Update

Secunia PSI Can see current state from Traybar Icon

Patch Integrity How do you know that a software update is legitimate? Checksums (e.g. Tripwire) Hash Value of package Cryptographically Signed MS Authenticode

Authenticode Popup

Authenticode ExecutableProgram Signature Author Certificate Source: Web Security and Commerce Simson Garfinkel and Gene Spafford

Large Scale Patching/Updating Pull vs. Push Fully Automated? Gradual Rollout One Some Many Document process

New Software Installations Binary Packages Fedora & RedHat:  yum install (Network)  rpm –ihv (Local file) Microsoft:  setup.exe (Self-Extracting Zip?)  Windows Installer (.msi files) Java and ActiveX Installers Source Code Autoconf Look for README files

Installation locations Windows: Typically c:\Program Files Libraries c:\Windows\System32 Linux: Distribution Packages: /usr Third Party: /usr/local Version Control? (i.e. stow)

Package Management Inventory Linux: rpm –qa Microsoft:  Start->All Programs  Control Panel->Programs->Programs and Features Removal Linux: rpm –e Microsoft:  Uninstall programs (Start->All Programs)  Control Panel->Programs->Programs and Features