Linux

Submitted by: Submitted by

Views: 18

Words: 281

Pages: 2

Category: Other Topics

Date Submitted: 01/31/2015 03:13 PM

Report This Essay

Linux Security

According to “Overview of Linux Kernel System” (n.d.) website, “Linux was initially developed as a clone of the Unix operating system in the early 1990s. As such, it inherits the core UNIX security model—a form of Discretionary Access Control (DAC).” The UNIX operating system allowed for permissions to be set to files in the directory, and the simple security scheme of UNIX was then inherited into the Linux Kernel System. Since UNIX security features did not meet the standards for our internet age, Linux had to implement new features. Linux allows for separate permissions to be set for individual users and different groups. Linux uses Namespaces that are used to help multi-level security, and files are named with security classifications, and potentially hidden from users without the appropriate security access. Linux has a very comprehensive and capable networking stack, supporting many protocols and features.  Linux can be used both as an endpoint node on a network, and also as a router, passing traffic between interfaces according to networking policies (“Overview of Linux Kernel System”, n.d.). Cryptographic API, Linux Security Modules (LSM) API, and Security Enhanced Linux (SELinux) where all added to the Linux Kernel System for added security features. The Linux Kernel Security system has evolved from its roots of UNIX and having to adapt to the ever changing requirements that come with the growth of the Internet, the value of information stored online, and the range of Linux based users. The continued change is and always shall be ongoing and challenging.

Reference

Overview of Linux Kernel System. (n.d.). Retrieved from http://www.linux.com/learn/docs/727873-overview-of-linux-kernel-security-features