We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Enhancing Security in Linux OS

by Ashvini T. Deshmukh, Parikshit. N . Mahalle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 12
Year of Publication: 2015
Authors: Ashvini T. Deshmukh, Parikshit. N . Mahalle
10.5120/20609-3239

Ashvini T. Deshmukh, Parikshit. N . Mahalle . Enhancing Security in Linux OS. International Journal of Computer Applications. 117, 12 ( May 2015), 34-37. DOI=10.5120/20609-3239

@article{ 10.5120/20609-3239,
author = { Ashvini T. Deshmukh, Parikshit. N . Mahalle },
title = { Enhancing Security in Linux OS },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 12 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number12/20609-3239/ },
doi = { 10.5120/20609-3239 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:14.680252+05:30
%A Ashvini T. Deshmukh
%A Parikshit. N . Mahalle
%T Enhancing Security in Linux OS
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 12
%P 34-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security of Linux depends on many configuration file both at system level and application level. Most important is security of the Linux system is never static. Once you secure your Linux system it does not perpetually stay secure because operational and functional changes had done through threats or new exploits are available for packages or applications hence need of secure system . The primary focus of this paper is securing Linux production system. There are many Linux Security requirements that need to pass various audits in an enterprise. Linux has many configuration files and many configuration files consist of security attributes which are the focus of this paper. This paper consists some standard security practices which are basic for Linux security.

References
  1. Andrea Barisani , Thomas Bader, Hacking Linux Exposed Linux security and secerets, Edition 3,2008.
  2. Manuel Cheminod,Luca Durante,Adriano Valenzano, "Review of security issues in industrial networks",IEEE transaction onindustrialinformatics,Vol. 9,No. 1,FEB2013.
  3. Ashvini T. Dheshmukh, Parikshit. N . Mahalle. Survey on linux security and vulnerabilities IJECS Publisher,v-3 issue 9 sept-2014,page no 8265-8269.
  4. Red Hat Engineering Content Services, Red Hat Enterprise Linux 6 Security Guide A Guide to Securing Red Hat Enterprise Linux, Edition 3, 2011.
  5. Udi Ben-Porat,Anat Bremler-Barr,"Vulnerability of network mechanisms to sophisticated DDoS attacks",IEEE transaction on computers Vol. 62,No. 5,May 2013.
  6. Nigel Edwards, Joubert Berger, and Tse Houng Choo. A Secure Linux Platform. In Proceedings of the 5th Annual Linux Showcase and Conference, November 2001
  7. Stefan Lindskog and Erland Jonsson,"Different Aspects of Security Problems in Network Operating System",
  8. Hannes Holm,Mathias Eksted,"Empirical Analysis Of System-Level Vulnerabilities Metrices through Actual Attacks" , IEEE transaction on dependable and secure computing,vol 9,no 6,Nov/Dec 2012.
  9. James Turnbull, "hardening Linux", 2005.
  10. P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell," The Inevitabil-ity of Failure:The Flawed Assumption of Security in Modern Computing Environments", In 21st National Information Systems Security Conference, pages 303– 314. NSA, 1998.
  11. Jaromír Hradílek Red Hat, Inc. Engineering Content Services,"Red Hat Enterprise Linux 6 Deployment Guide Deployment, Configuration and Administration of Red Hat Enterprise Linux" , Edition 3,2012.
Index Terms

Computer Science
Information Sciences

Keywords

Computer Security Security Parameter Threats Script Vulnerability.