Studyspark Study Document

Linux Security Technologies Research Paper

Pages:3 (1182 words)

Sources:1+

Subject:Technology

Topic:Unix

Document Type:Research Paper

Document:#13613095


Linux Security Technologies

The continued popularity and rapid growth of open source software in general and the Linux operating system specifically are having a disruptive impact on proprietary software. The disruptive impacts of open source software are so pervasive that they are completely re-ordering the enterprise system strategies in many corporations globally today (Rooney, 2004). With this proliferation of open source software and the foundation being laid by the Linux operating system, there continues to be an urgent and escalating need for new security tools and applications and tools as well. Of the many security applications and tools available for the Linux operating system, the three that will be analyzed and assessed in this paper include chroot jail, iptables and SELinux. The analysis will include which organizations are sponsoring the development of each of these technologies, an explanation of how each of these technologies change the Linux operating system to make it more secure, and which types of threats each of these technologies are designed to eradicate and protect against.

chroot jail Evaluation

Originally designed and first launched in the initial release of Unix Version 7, which was first introduced in 1979, the chroot jail command limits which users have access to the root directories of UNIX. This is critically important from a system administration command standpoint, as the root directory access on a UNIX system can quickly re-order directory structures and en masse delete data and applications. During this timeframe the Berkeley System Division (BSD) UNIX was also very popular, and the vulnerability of root directory access was a very high security priority for commercial, educational and government organizations standardizing on this command. The chroot jail command was quickly integrated into the initial BSD releases due to the high priority customers of this operating system placed on its value from a security and system administration standpoint (Rooney, 2004).

There are many configuration and customization options for the chroot jail command, yet the most common use scenario is to control which user accounts have access to the root directory, / home/user directory. When this command did not exist any user could get to any location in the system, with full rights to edit, duplicate, delete or modify applications. As the UNIX kernel in Linux recompiles at application run-time, this could easily change which applications were working correctly or not (Rooney, 2004). This command also blocked unwanted access over networks connected to UNIX systems as well. Prior to this command it was possible for sophisticated users including hackers to traverse an entire network and gain access at the root level to any system they chose (Rooney, 2004). As of 2012, this command is being used to create development environments or sandboxes for testing applications and ensuring spurious or erroneous threads don't crash the system or harm other, more stable applications. This technology is now also pervasively used for creating network-wide application testing and validation for Web-based applications including social network platforms running on the Linux operating system.

SELinux Evaluation

This technology first was introduced in December, 2000 as part of the GNU GPL release, one of the most successful open source operating systems ever produced. The core technology of SELinux was invented by the U.S. National Security Agency (NSA) and commercialized for use so organizations could benefit from its many benefits. SELinux has significant support as a core technology in many distributions of the Linux operating system and its variants, including Linux kernel 2.6.0-test3 operating system (8/2003 release) (Greenemeier, 2005). The premise of this technologies' architecture is based on having the agility…


Sample Source(s) Used

References

Forristal, J. (2001). Fireproofing against DoS attacks. Network Computing, 12(25), 65-74.

Greenemeier, L. (2005). More-secure Linux still needs to win users. InformationWeek, (1029), 28-28.

MacVittie, L. (2005). Linux models a few new hats. Network Computing, 16(3), 28-30.

Rooney, P. (2004). Migrating to LINUX. CRN, (1092), 28-28.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

UNIX Linux Operating Systems

Pages: 3 (788 words) Sources: 1+ Subject: Education - Computers Document: #81081074

Linux Security Strategies Comparing Linux Security Applications The pervasive adoption of the Linux operating system has led to a proliferation of new security tools and applications for ensuring the security of systems and applications. The intent of this analysis is to evaluate chroot jail, iptables and SELinux. These three security technologies are evaluated from the standpoint of which organizations were behind their development, in addition to an explanation of how each technology

Studyspark Study Document

Linux Feasibility Linux Started Around 1991 Because

Pages: 3 (1005 words) Sources: 2 Subject: Education - Computers Document: #26456278

Linux Feasibility Linux started around 1991 because students were not satisfied with Minix. Linux operating system provided an affordable alternative for the expensive UNIX operating system. Because of affordability, Linux became popular, and Linux distributors were created. Linux was built with networking in mind hence provides file sharing. Linux can work with most computers because it does what it is told and works gracefully as a server or workstation. Workstation and servers Workstation

Studyspark Study Document

Linux Operating System Analyzing and

Pages: 5 (1830 words) Sources: 4 Subject: Education - Computers Document: #58330602

Storage management, creating and maintaining a file system, and integrating them into networks also share a common set of functions that allow for programmer flexibility in terms of their use and sequencing through an application. These functions are specifically called as part of the kernel of the Linux operating system, and as a result they can be selectively updated very quickly. A full recompile of the entire operating system

Studyspark Study Document

Information Technology Refuting the Claims

Pages: 12 (3173 words) Sources: 8 Subject: Education - Computers Document: #40354095

Linux Kernel Analysis Much has been written in praise of the Linux (Crandall, Wu, Chong, 359), (Parnas, 112), (Baliga, Iftode, Chen, 323), and its use of preemptive multitasking memory architectures to manage process control, file management, device management, information maintenance and communications subsystems securely and effectively. The Linux modular design, lack of reliance on Remote Procedure Calls (RPC), and use of UNIX-based system administration all are often cited as factors in how

Studyspark Study Document

Knoppix Linux Knoppix Is a

Pages: 4 (1724 words) Sources: 5 Subject: Education - Computers Document: #61143448

" ACM Queue 5.4 (2007): 38-47. ABI/INFORM Global. ProQuest. 11 Jun. 2008 Scott Granneman. "Fixing Linux with Knoppix; How to: First Windows, now Linux. We show you how to repair boot issues, work with key system files, and work with Linux partitions. From the ExtremeTech book Hacking Knoppix. " ExtremeTech.com 17 Feb. 2006: 1. ABI/INFORM Trade & Industry. ProQuest. 9 Jun. 2008 Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angelis. "Understanding knowledge

Studyspark Study Document

Windows 7 Operating System Vs. Ubuntu Linux Operating System

Pages: 3 (1100 words) Sources: 3 Subject: Education - Computers Document: #69765186

Windows 7 Operating System vs. Ubuntu Linux Operating System. Windows and Linux have sustained a head-to-head competitive race. Whilst Windows 7 is the premier and best selling operating system for personal desktop use, Linux, and Linux Ubuntu included, has achieved a reputation as the most prominent Free Software and Open Source operating system. Individuals -- such as I - prefer Windows due to better consumer familiarity, whilst other individuals, on

Join thousands of other students and

"spark your studies".