SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsI had recently been assigned to a project whose main objective was to create a secure file transfer system on a secure operating system which will be used to provide users the capability of uploading and downloading label controlled data. My specific task was the file transfer potion of the system. I was told the secure operating system that the project would be utilizing, the file transfer program I would be installing, and a suggested direction of implementation. As I had never worked with any of the three, I knew that I had my work cut out for me. The following is the process that I used to configure my portion of the label controlled file transfer system. I will touch on Trusted Solaris (TSOL), the secure operating system, Washington University File Transfer Protocol Daemon (wuftpd), the file transfer program, and a chroot jail, the suggested direction of implementation. By the end of the project I had configured a file transfer system that displayed an acceptable amount of security for my project leader (What more can you ask?).