Linux Security Technologies
The continued popularity and rapid growth of open source software in general and the Linux operating system specifically are having a disruptive impact on proprietary software. The disruptive impacts of open source software are so pervasive that they are completely re-ordering the enterprise system strategies in many corporations globally today (Rooney, 2004). With this proliferation of open source software and the foundation being laid by the Linux operating system, there continues to be an urgent and escalating need for new security tools and applications and tools as well. Of the many security applications and tools available for the Linux operating system, the three that will be analyzed and assessed in this paper include chroot jail, iptables and SELinux. The analysis will include which organizations are sponsoring the development of each of these technologies, an explanation of how each of these technologies change the Linux operating system to make it more secure, and which types of threats each of these technologies are designed to eradicate and protect against.
chroot jail Evaluation
Originally designed and first launched in the initial release of Unix Version 7, which was first introduced in 1979, the chroot jail command limits which users have access to the root directories of UNIX. This is critically important from a system administration command standpoint, as the root directory access on a UNIX system can quickly re-order directory structures and en masse delete data and applications. During this timeframe the Berkeley System Division (BSD) UNIX was also very popular, and the vulnerability of root directory access was a very high security priority for commercial, educational and government organizations standardizing on this command. The chroot jail command was quickly integrated into the initial BSD releases due to the high priority customers of this operating system placed on its value...
Linux Security Strategies Comparing Linux Security Applications The pervasive adoption of the Linux operating system has led to a proliferation of new security tools and applications for ensuring the security of systems and applications. The intent of this analysis is to evaluate chroot jail, iptables and SELinux. These three security technologies are evaluated from the standpoint of which organizations were behind their development, in addition to an explanation of how each technology
Linux Feasibility Linux started around 1991 because students were not satisfied with Minix. Linux operating system provided an affordable alternative for the expensive UNIX operating system. Because of affordability, Linux became popular, and Linux distributors were created. Linux was built with networking in mind hence provides file sharing. Linux can work with most computers because it does what it is told and works gracefully as a server or workstation. Workstation and servers Workstation
Storage management, creating and maintaining a file system, and integrating them into networks also share a common set of functions that allow for programmer flexibility in terms of their use and sequencing through an application. These functions are specifically called as part of the kernel of the Linux operating system, and as a result they can be selectively updated very quickly. A full recompile of the entire operating system
" ACM Queue 5.4 (2007): 38-47. ABI/INFORM Global. ProQuest. 11 Jun. 2008 Scott Granneman. "Fixing Linux with Knoppix; How to: First Windows, now Linux. We show you how to repair boot issues, work with key system files, and work with Linux partitions. From the ExtremeTech book Hacking Knoppix. " ExtremeTech.com 17 Feb. 2006: 1. ABI/INFORM Trade & Industry. ProQuest. 9 Jun. 2008 Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angelis. "Understanding knowledge
Review on Android and Smartphone Security Abstract Currently, Android controls the largest market share among operating systems for smartphones. Smartphone users have woken up to the realization that security is an issue that must be kept in mind all the time. The enhancement of performance and increase in features also multiply in tandem with risk such as virus attacks. It is possible that Android could be the most secure operating system, compared
Windows CE: Compare/Contrast Linux and Windows XP Windows CE Windows CE (consumer electronics), as the name indicates is Microsoft's embedded operating system specially developed for many types of consumer electronic gadgets like PDA's, industrial controllers and other mobile communication devices. It is in a true sense a multitasking and multithreading operating system and hence allows for two applications to be run at the same time. The first version of Windows CE had
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now