Linux Security

Read Complete Research Material



Linux Security

Abstract

In this research, we try to discover the insight of “Linux” in a holistic perspective. The key heart of the study is on “Linux” and its relation with “Security”. The research also examines various characteristics of “Linux” and tries to measure its effect. Lastly the research illustrates a variety of factors of “Linux Security” and tries to describe the overall effect of it.

Table of Content

Introduction4

Selinux4

Chroot Jail5

Iptables5

Conclusion6

Linux Security

Introduction

Linux is a product of the Internet Development, which got rapidly developing in China. The proportion of using Linux as the core system of network server is being increased year by year, so does the application of Linux in personal computer. The open source strategy of Linux made it enjoy great popularity of most users, but, at the same time it also made the kernel took in everything in a glance, others may also made use of the existing leakage of the system, so we should pay more attention to the safety design of network system. Network security technology primarily sets access permissions for customers or processes the package in network transmission for the safety problems. With the Linux system, there are three main technologies that are in use today.

Selinux

SeLinux is an “add-on” security suite to the standard Linux kernel. It provides added security through Mandatory Access Control (MAC). SELinux is mainly designed to control access by internal users. Linux had some security features in place such as read, write, and execute permissions, but these could be over ridden by the users. With SELinux access is controlled through administration policies. They can only be changed at the administration level also. SeLinux is a good start but by no means a complete security package. It does not protect from outside threats. This is where iptables comes into play.

Chroot Jail

Chroot jail is a section within the ...
Related Ads