Premium Essay

Linux Research

In:

Submitted By bbelt23
Words 541
Pages 3
The first thing I would like to talk about here would be SELinux, there are many contributors to SELinux but it all really comes back to four major organizations that are responsible for the initial public release of SELinux. These organizations include The National Security Agency, Network Associates Laboratories, The MITRE Corporation, and finally the Secure Computing Corporation. From my research I have found that it all really started with the NSA when they developed the LSM-based SELinux and made it part of Linux 2.6, and this has also led to the development of similar controls in the X Window System (XACE/XSELinux) and for Xen (XSM/Flask). Then NAI Labs implemented several additional kernel mandatory access controls, developed the example security policy configuration and also contributed to the development of the Linux Security Modules kernel patch. The MITRE Corporation helped several common Linux utilities because SELinux-aware and developed application security policies. The SCC developed a preliminary security policy configuration for the system that was used as a starting point for NAI Labs’ configuration, and also developed several new or modified utilities. SELinux controls access between applications and resources, and it does this by using mandatory security policy SELinux enforces the security goals of the system regardless of whether applications misbehave or users act carelessly. You can check of SELinux is enabled in Red Hat, or Fedora by using the getenforce command, if it returns enforcing SELinux is enabled and enforcing the policy. If you get permissive that means SELinux is enabled but is only logging failed accesses, not denying them. If Disabled is displayed then SELinux is not enabled on your system. Chroot was introduced to BSD by Bill Joy on March 18 1982, 17 months before 4.2BSD was released in order to test its installation and

Similar Documents

Free Essay

It302 Linux System Administration Research Assignment 1

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. Linux V-Server – The three basic elements of the VServer are: * The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. * Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network addresses...

Words: 423 - Pages: 2

Premium Essay

Linux Research Paper

...NT1430 Linux Networking Research Paper Nicholas Lorick ITT Technical Institute St. Petersburg Campus NT1430 Linux Networking Research Paper All people in the IT field are familiar with the IPv4 protocol and they are quickly becoming familiar with the IPv6 protocol. Bradley (2012) states the following: Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34) With all the new technology and devices now accessing the internet the move to IPv6 will eventually happen. According to Bradley (2012), IPv4 is out of IP addresses. IPv4 supports only 4.3 billion addresses; and with PCs, smartphones, tablets, and gaming systems connecting to the Internet, we are running out of IP address. IPv6 uses 128-bit addresses and can maintain 340 undecillion (340 × 1036) addresses. The IPv6 protocol brings with it other benefits. With IPv4 most of the internet relies on Network Address Translation. With IPv6, every device can have its own unique public IP address. Most home and small-business users have one IP address on the Internet -- the one for the router that links their hardware to their ISP. The router issues IP addresses internally to the devices that attach to it, but it must constantly keep track of which traffic...

Words: 1059 - Pages: 5

Premium Essay

Operating Systems

...software applications can operate accordingly. Operating systems can be found in almost any type of a computer device such as personal computers, supercomputers, cellular telephones, and video game consoles as stated by Linux Systems (2011). As the research was being conducted for this paper, it raised a question whether the internet uses the operating system? It proved to be a challenge to actually pin point the most common operating systems on the Internet, but as the research continued, it was obvious that these three, Windows, Mac OS X, and Linux are considered to be the most common operating systems used on the Internet today. Background of each Operating System Windows Privately owned operating systems, Microsoft Windows is generally used on personal computers and as of today, the most commonly used version is Windows XP with the new version of Windows 7 for personal computers and Windows Server 2008 R2 for servers is entering the market. Mac OS X Mac OS X is a graphical operating system which is designed and distributed by Apple Incorporated is considered to be partially privately owned. Its latest version of software is pre-loaded on all of the Macintosh Computers and is also a UNIX operating system that uses advanced technology. Linux Is an operating system that can be used on a variety of devices such as personal computers, supercomputers, and some hand...

Words: 1150 - Pages: 5

Free Essay

Os Comparision

...Elsevier B.V. Linux vs. Windows: A Comparison of Application and Platform Innovation Incentives for Open Source and Proprietary Software Platforms Nicholas Economides and Evangelos Katsamakas ABSTRACT The chapter analyzes and compares the investment incentives of platform and application developers for Linux and Windows. We find that the level of investment in applications is larger when the operating system is open source rather than proprietary. The comparison of the levels of investment in the operating systems depends, among others, on reputation effects and the number of developers. The chapter also develops a short case study comparing Windows and Linux and identifies new directions for open source software research. Keywords: Open Source Software, operating systems, technology platforms, Linux, innovation incentives. JEL Classification: L 10, L86, L3 1. 10.1 INTRODUCTION Open source software is an emerging type of software that may fundamentally affect the business and economic features of the software industry. Linux, an open source operating system, has been the prominent example of the potential of the open source movement, competing against Microsoft Windows, the incumbent operating system. 208 Nicholas Economides and Evangelos Katsamkas This chapter analyzes the incentives to invest in application software and an operating system under two different software ecosystems: one based on an open source operating system, such as Linux, and the other based...

Words: 4770 - Pages: 20

Free Essay

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71

Free Essay

Evolution of Unix

...use on one computer did not work on another. Today’s basic cell phone has more processing power and memory capabilities as computers from the 1960's. The few operating systems available at that time performed very limited tasks and were exclusive to the computer it was written on. In other words when one upgraded to a newer computer, the operating system and all data that you wanted transferred from the old computer had to be rewritten on the newer model. In 1965 a joint effort of Bell Labs, MIT and GE began to develop a general computer operating system that was named the MULTICS (Multiplexed Information and Computing Service) mainframe timesharing system. The MULTICS project was being funded by the Department of Defense Advanced Research Projects Agency. The goal of the MULTICS group was to develop a feature-packed information utility that would allow timesharing of mainframe computers by large communities of users. It was also designed to be able to support multilevels of security with the military in mind. When Bell Labs joined the project their goal was to obtain a timesharing system for use by members of the technical staff at Bell Labs. When the planned time had passed and MULTICS was not ready to use, it was clear that there was a lot more work to do, Bell Labs felt they had no choice than to opt out in 1969 (Ward 2009). Even though Bell Labs withdrew from the MULTICS project, two programmers from Bell Labs, Ken Thompson and Dennis Ritchie, decided to continue...

Words: 1891 - Pages: 8

Free Essay

Evolution of Unix

...use on one computer did not work on another. Today’s basic cell phone has more processing power and memory capabilities as computers from the 1960's. The few operating systems available at that time performed very limited tasks and were exclusive to the computer it was written on. In other words when one upgraded to a newer computer, the operating system and all data that you wanted transferred from the old computer had to be rewritten on the newer model. In 1965 a joint effort of Bell Labs, MIT and GE began to develop a general computer operating system that was named the MULTICS (Multiplexed Information and Computing Service) mainframe timesharing system. The MULTICS project was being funded by the Department of Defense Advanced Research Projects Agency. The goal of the MULTICS group was to develop a feature-packed information utility that would allow timesharing of mainframe computers by large communities of users. It was also designed to be able to support multilevels of security with the military in mind. When Bell Labs joined the project their goal was to obtain a timesharing system for use by members of the technical staff at Bell Labs. When the planned time had passed and MULTICS was not ready to use, it was clear that there was a lot more work to do, Bell Labs felt they had no choice than to opt out in 1969 (Ward 2009). Even though Bell Labs withdrew from the MULTICS project, two programmers from Bell Labs, Ken Thompson and Dennis Ritchie, decided to continue...

Words: 1891 - Pages: 8

Premium Essay

Competitive Strategies

...favored by fortune 500 companies are Windows, Red Hat Linux and AIX. Operating Systems perform basic task that supports the use of input, the printers, drivers, keyboard and the display screen. The operating systems support different programs and users running on it at the same time. It also supports the security and user abilities. Operating systems provide software platforms on top of applications, like Java, Visual Basic etc. These applications have to be written to run operating systems. There are several choices of operating systems DOS, OS/2, Windows, AIX, and Linux. The two main operating systems are Windows and Linux/Unix. “And they have a competitive history and future” (Haas). Before we get into the technicalities of either operating system, let’s examine the environment that these two systems evolved from, or the culture from whence they came, if you will. “Corporate culture pertains to the identity and personality of the company we work with, either in the private or public sectors. All companies have a culture; a way they behave and operate. They may be organized and disciplined or chaotic and unstructured. Either way, this is the culture the company has elected to adopt” Brice, (2012). “Microsoft may appear to some people as a company without culture, but that impression changes upon entering the Sigma Building, which houses Microsoft Research Asia. Chatting with the great minds at Microsoft Research Asia, one is reminded of an open university that knows...

Words: 1073 - Pages: 5

Premium Essay

Information System Security

...Claudia Goodman IT302 Homework 2 Security-Enhanced Linux The NSA has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. It recognizes the critical role of operating system security mechanisms in supporting security at higher levels. End systems must be able to enforce confidentiality and integrity requirements to provide system security. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. Application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several of these projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. This has been mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel. This provides a mechanism to enforce the separation of information based on confidentiality and integrity requirements and it allows threats of tampering and bypassing of application security mechanisms to be addressed while enabling the confinement of damage that can be caused by malicious or flawed applications. This is simply an example of how mandatory access controls that can confine the actions of any process, including an...

Words: 1522 - Pages: 7

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Free Essay

Research Project - Lamp Server

...Research Project – LAMP Server LAMP is short for Linux, Apache, MySQL and PHP. It’s an open-source web development platform, otherwise known as a web stack, that uses Linux as the operating system, Apache as the web server, MySQL as the RDBMS and PHP as the scripting language. Perl or Python is commonly substituted for PHP. In short, a LAMP server is a self-contained web service used to configure and host websites on the internet. Many large corporations use LAMP servers as their primary web servers including Google. In a LAMP server, Linux is the type of operating system that is used to run the services for the server. There are many different versions of Linux including Red Hat, Debian, Ubuntu, and Fedora, all of which are open-source. The Apache HTTP Server has been the most popular web server on the public Internet. Apache is created and kept up by an open group of engineers under the support of the Apache Programming Establishment. Discharged under the Apache Permit, Apache is open-source programming. A wide mixed bag of components are bolstered, and a hefty portion of them are actualized as gathered modules which amplify the center usefulness of Apache. These can go from server-side programming dialect backing to confirmation plans. MySQL is a freely available open source Relational Database Management System (RDBMS) that uses Structured Query Language (SQL). SQL is the most popular language for adding, accessing and managing content in a database. It is most noted for...

Words: 390 - Pages: 2

Free Essay

Linux Security

...Project Part 1 ITT Technical Institute Table of Contents Task 1 Page 3 Task 2 Page 6 Task 3 Page 7 References Page 8 Task 1 First World Bank is a savings and loan financial institution that provides services to their customers like loans, credit cards and standard banking services. First World Bank believes that once they can provide their services online they will gain $100,000,000 a year in online credit card transactions. The issue is how to securely provide their services to their customers and how they can provide those services and still save money in doing so. First World Bank will have to comply with federal regulations to be compliant and to avoid fines and sanctions. If the First World Bank fails to safe guard the information that they have stored on their customers and that information is compromised then the First World Bank will lose customers and also their reputation. Gramm-Leach-Bliley Act (GLBA) is one of the federal regulations that the First World Bank needs to be in complaint and stay in compliance with. Gramm-Leach-Bliley is a regulation that requires banks to safe guard customer’s information and to provide how the institution shares customer’s information, what information is collected, who they share the information with, and how they protect it. This information is required to be disclosed to customers in writing, in the written notice the customer will also be advised...

Words: 1405 - Pages: 6

Free Essay

Looking Beyond Windows

...Marketing Research Submitted by: GROUP-5 Ajit Kumar Anand 03 Chetna Asopiya 04 Doly Chotwani 07 Ashish Dhole 10 Kunal Gogri 13 Reema Jain 16 Rohit More 31 Kajal Tuteja 48 Submitted to: Prof. Victor Manickam T.Y.BMS 2005-2006 Semester VI V.E.S COLLEGE OF ARTS, SCIENCE AND COMMERCE. Index |Chapter No. |Topic |Page No. | |1 |Introduction of the topic | | |1.1 |Profile of the company: Xcel Solutions | | |1.2 |Introduction to the project: “Looking Beyond Windows” | | | | | | |2 |Research Methodology | | |2.1 |Primary Research | | |2.2 |Secondary Research ...

Words: 5125 - Pages: 21

Premium Essay

Cis 210 Term Paper

...Benjamin Porter 12/13/13 Benjamin Porter 12/13/13 Abstract Developing and designing an effective in house e-commerce website for Tony’s Chips. Abstract Developing and designing an effective in house e-commerce website for Tony’s Chips. Website MIGRATION PROJECT [Document subtitle] Website MIGRATION PROJECT [Document subtitle] Introduction Tony’s Chips has been acquired by a new independent company. The new company’s intention is to focus on the e-commerce website that they have planned. Currently, the old website is externally hosted and it is required to be moved to an internal one. This new system will store, retrieve, and have data recovery solutions for the company. An additional backup site will need to be created as a failover if the main site goes down. The new and improved site will need to allow customers access to order products online. Project Goal This project has an overall goal of producing a system and website that is in accordance to the demands of Tony’s Chips. The systems architecture will involve all of the systems requirements in its design. The architecture will make use of programs that perform efficiently and properly. Application compatibility is also key to for all of the system components that are going to be used in the system. The project is also aimed at creating a reliable backup and recovery solution for the system. Available system component alternatives The requirements for the system is one that has a system architecture...

Words: 2669 - Pages: 11

Premium Essay

Homework

...Michael Suazo Date: 10-03-13 Windows 7 VS Linux Based on my research on Windows 7 VS Linux, I would recommend Dr. Massenat to convert his machines over to Linux. Reason one being it would be far cheaper than buying Windows 7 ISO and will not have the need to replace the machine that are currently in use. Having Linux running one the current Dell machine will provide better performance than that of Windows XP and Windows 7. The learning curve for the Linux system will vary from student to student but like all new things we all have to learn how to adapt. The GUI is far more different then your typical Windows XP or Windows 7 desktop and will require a bit more looking and searching around to find what you’re looking for to use. Now with running windows programming on Linux there may be some issues, first of all any windows only software can be used on Linux OS by using Wine or even Cross-over. Whine is a free software that allows users to install and run Microsoft only programs for free. With all free things there is still a price to pay, and that is stability to run the programs. Cross-over is another application that can be used to run windows apps but this is not a free software. Considering that some programs will run better than others and some none at all, being able to dual boot or running windows threw a virtual machine may help with stubborn...

Words: 258 - Pages: 2