Linux Security Technologies Essay

1086 Words Jun 14th, 2012 5 Pages
With a world that is vastly growing in size so does our use for technology. With this use of technology come lots of potential threats and hazards. Our world today is ever so growing with its relationship with the internet or World Wide Web (WWW). Many places use the internet to access sites, software, music, book, and so forth, the list goes on. But with this advance in technology come lots of threats to consumers alike. Such as hackers, viruses, people who don’t know what they are doing, and even people who you may call your best friend. Threat comes in many shapes and sizes which is why operating systems such as Linux develop ways to keep your personal files safe from these unwarranted threats. Some of these measures include, but …show more content…
Some of the policies used by SELinux was designed to keep out unwanted processes and to protect its users by pretty much being a watch dog. If someone were to attack your system the SELinux limits what damage could actually be done by preventing a file from being read or tampered with.
SELinux will assign a string that states the role, user name, and domain type. If you are not configured by this policy to access certain files you will be denied access. It will let the Admin know what security threats have been made, such a Joe Bob trying to hack into your system to get some personal laughs. SELinux runs on three different states (modes): enforcing-which is the default state of SELinux and is set so that no user or program can do anything without the proper clearance, permissive-which is a diagnostic state that sends warnings, but nothing is enforced and makes a good guide for building a new security policy, and disabled-which basically means its shut off no policy is enforced or loaded., which you can read more about on page 414, Chapter 11 of “A Practical Guide to Fedora and Red Hat Enterprise Linux” cited in the works cited of this document. Another Linux based security program that can be obtained and used is iptables. Linux uses iptables to build and manipulate the network packet filtering rules within the kernel (Sobell, Pg.819). Iptables allow an administrator to setup NAT or Network Address Translation (found on page 1095 of Sobell’s

Related Documents