Nobody downloaded yet

Security-Enhanced Linux System - Research Paper Example

Comments (0) Cite this document
Summary
The author examines the pros and cons of using SELinux in a volatile and insecure environment and that SELinux has taken policy administration into a completely different league, which has raised further questions. As such, users await with eagerness as to what the subsequent versions of SELinux.  …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Security-Enhanced Linux System
Read TextPreview

Extract of sample "Security-Enhanced Linux System"

Download file to see previous pages In the modern information age, one is aware of the ongoing battle between proprietary software providers and open source initiatives with each trying to vie over the other in an effort to gain control of the software market. While the traditional profit-seeking proprietary vendors have been building their presence over the years through sound branding and marketing, the people involved in open source initiatives have succeeded in gathering a relatively commendable group of dedicated enthusiasts who are passionate about software and who believe that it must be available to everyone for free. Over the years, despite the availability of hundreds of amazing open source tools, one name has captured both the imagination and awe of everyone, irrespective of what they ultimately support. Linux-the use of the name brings to mind two major things, one is free software and the other is Linus Torvalds, who conceived the idea of providing an operating system to users for free and succeeded in initiating and sustaining a whole movement behind his vision.
Over the years, Linux has been made available in different flavors and users have been innovative in using the freely available source code to modify and use according to the requirement at hand. Various issues such as speed, adaptability, resource usage, embedded systems, distributed computing, and complex analysis have served as major purposes that have enabled Linux to be developed in different ways. However, one of the most important purposes of developing Linux towards future versions has been with a view to providing greater security in the midst of an internet riddled with hacks and exploit by unscrupulous elements. One such attempt was the create a security architecture that would combat all known issued involving security with Linux as the foundation (Bill McCarty, 2005). Thus, security-enhanced Linux or SELinux was born. The next section will elaborate further on the topic.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security-Enhanced Linux System Research Paper Example | Topics and Well Written Essays - 2750 words, n.d.)
Security-Enhanced Linux System Research Paper Example | Topics and Well Written Essays - 2750 words. Retrieved from https://studentshare.org/information-technology/1719498-linux-system
(Security-Enhanced Linux System Research Paper Example | Topics and Well Written Essays - 2750 Words)
Security-Enhanced Linux System Research Paper Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/information-technology/1719498-linux-system.
“Security-Enhanced Linux System Research Paper Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/information-technology/1719498-linux-system.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security-Enhanced Linux System

SECURITY ISSUES IN RED HAT ENTERPRISE LINUX

...information. This problem has been compounded by the proliferation of networked PCs and servers as well as the growing intelligence of malicious software that seeks to exploit and expand throughout the Internet infrastructure. Companies such as Red Hat are releasing new technologies and tools to address the needs of system administrators responsible for managing the security of large numbers of geographically dispersed systems. For example, technologies such as Position Independent Executables (PIE) and Exec Shield help protect against buffer overflows, a tactic frequently employed by attackers to infiltrate and compromise flawed software programs. Another technology,...
68 Pages(17000 words)Dissertation

E-crime investigation. Security breach on a Linux Operation System

...that is providing connectivity to the hacker for gaining control of the system. Moreover, representing itself as an LKM that has capabilities of hiding network connections, related processes and files, system administrator or network engineers were not able to diagnose anything wrong with the system. Moreover, firewalls or security tools were also bypassed and were not able to analyze modifications in checksums of system binaries. After analyzing Adore.c, the second file that needs to be investigated was rc.local that represented a modification to inode simultaneously. Comparing the infected system with the clean system...
12 Pages(3000 words)Assignment

Linux Operating System

...and no charge for renewing the system Linux works in a broad variety of diverse hardware The system of Linux is soundly capable to continue working without restarting or rebooting Linux is quite secure and it’s popular for its quality and strength Linux is known for its flexibility As Linux was tested and developed by lot of professionals worldwide, thus, people who are expert in fixing the errors can be easily found (Defree, “Strengths and Weaknesses of Linux”). Weaknesses of Linux A vast amount of diverse distributions Using Linux is not easy and is...
3 Pages(750 words)Research Paper

Analysis of Red Hat Linux Operating System

...configuration tool Lokkit, Red Hat is an established name in the open source operating system market space. This may be due, in part, to its appealing graphical interface for users and the accessibility of its programmer interface, which is intelligently presented. By reviewing this interface, as well as some advantages and disadvantages of the operating system, why exactly Red Hat is a respected name in Linux circles may become clearer. Red Hat is ostensibly based on the design principles of simplicity, robustness, and security (Cunningham & Cunningham, 2007). Simplicity refers to simple abstractions and simple components, which leads to faster and more efficient use of...
6 Pages(1500 words)Research Paper

The Social Security System

...? The Social Security System School The Social Security System History of the Social Security System In the year 1934, the Committee on Economic Security (CES) was created by the President Franklin D. Roosevelt. Roosevelt assigned the CES the responsibility of exploring the feasibility of a system of economic security that would provide the disabled and the elderly people with income. The government and the family members were the caretakers of the people who were not unable to work. Roosevelt felt the requirement of a national system. Therefore, the CES submitted their...
6 Pages(1500 words)Research Paper

Linux

...of free blogs, forums and websites. Training of the staff is the major factor that needs to be considered before introducing Linux in the environment. It should be done by conducting seminars and training of employees by IT staff members. Before implementation required software should be interrogated whether supporting Linux or not. As Linux is modifiable it can be integrated as per the requirements. Linux is considered as secure operating system means less vulnerable with very less downtime. No compromise on the production means highly reliable. Now as for the recommendation for which distribution should be considered, we’ve already...
4 Pages(1000 words)Assignment

System Security

...___________ Grade _____________ d: 2008-12-21 System Security System security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event. Initially the secure and financial data were not on the internet directly so at that time the most common threat to a computer system or to a land environment was the virus attack. Criminal minded geniuses were designing the virus to destroy a system partially or completely. This provided an edge to the antivirus companies to scan,...
2 Pages(500 words)Essay

The LInux Operating System

...productivity. Linux can be used for hosting large scale inter departmental networks as well as the intranet of any organization with greater efficiency and throughput than the normal operating systems. Applications can be built on top of the OS and with the Open Office suite of products, word processing and spreadsheet software can be used as well. Thus, “Linux is now the worlds No. 2 server operating system, with about 27% of the market behind Microsofts various Windows systems, which run more than 40% of servers and most desktop computers, according to the technology research firm IDC” (USA Today, 2002). A FLAVOR OF LINUX Fedora...
4 Pages(1000 words)Research Paper

Linux distributions

...vendor. A good IT infrastructure always ensures high return over investments made in it. So the large companies do not care much about the cost involved rather consider its flexibility, reliability and a reliable support system. In this project we will be discussing about desktop and server edition of three LINUX based implementations, Red Hat, Ubuntu & Novell and the standard Windows based systems. Conclusively, we will attempt to recommend a certain package on the basis of the outcome of such discussion. Discussions: Training While purchasing software for an enterprise operation, the preliminary aim is to assist its employees to automate and enhance the operations of...
9 Pages(2250 words)Essay

Linux

...? Linux can be used in super computers, which is a huge benefit. Linux is fairly easy to use even though it is not object-oriented programming. The user interface, also known as shell or GUI in modern days is utilized by the user to execute commands. Using the shell or GUI through controls attached to the associated hardware, which is common for embedded systems. For desktop systems, the default mode is usually a graphical user interface, although the CLI is available through terminal emulator windows or on a separate virtual console. (http://www.linux.com/) How do you connect to a Linux box? SSH or telnet? What are they? What is the difference? SSH is...
3 Pages(750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Security-Enhanced Linux System for FREE!

Contact Us