SlideShare a Scribd company logo
What is Linux Security?
Solution
Linux Security is a module in a Linux Operationg System which gives Protection from security
attacks and misuse of Operating Sysytem.It ensure Protection from the Enemy who's Bad
Intention is to leak ,steal,change data or Hack your system. There are different types of security
threat as follow:
Reading data - Typically associated with espionage or theft, computer systems often contain
information that needs to be kept confidential or secure. This could vary from emails discussing
the price of a bid for a project to personal information or bank details. The disclosure of this
information could severely damage the company or have legal implications
Changing data - Potentially even more serious is that an attack could gain sufficient access to be
able to update data. This could be for sabotage, as a means of discrediting the organisation or
leaving a calling card. One of the biggest risks is that data could be modified and not noticed.
The cases that tend to get a high profile in this area are where attackers replace web pages with
their own modified versions.
Denial of service - Denial of Service (DoS) attacks are where the attacker disables, or makes
unusable the services provided by the system
Access to computer - Whilst for some systems you may allow other users onto your system
sometimes these user accounts could come under attack. The computer may not contain any
confidential material and the user may not be able to write to any data however they could still
use your system to cause damage. If someone manages to attack a computer that borders between
a secure and insecure network then they could use your machine as a method of traversing
between the two networks.
Linux OS has Security Policy which ensure that you have covered all of the principles
Authorisation, Authenticity, Privacy / Confidentiality, Integrity, Non-repudiation and
Availability as they apply to your system. Also consider how this is going to be implemented by
the users and system administrators. If a security process is hard to implement or restricts
someone from doing their job then you may find that the process gets ignored or is not complied
with.
Linux security Policy Requriments according to Data Protection Act 1998 and ISO 7984-2
International Standards Organisation Security Standard are:
Authorisation - Only allow those that need access to the data
Authenticity - Verifying they are who they say they are
Privacy / Confidentiality - Ensure personal information is not being compromised
Integrity - Ensuring that the data has not been tampered with
Non-repudiation - Confirmation that data is received. The ability to prove it in court
Availability - Ensure that the system can perform it’s required function

More Related Content

PPTX
Computer Security Chapter 1
PPTX
Client server network threat
PPT
Chapter1 intro network_security_sunorganised
PPTX
MODELING THREATS HAER YERE SINIRR JKOA A
PDF
Lecture 01 Information Security BS computer Science
PPTX
Introduction to cyber security.pptx
PPTX
Website security
PPTX
Unit 1 Network Fundamentals and Security .pptx
Computer Security Chapter 1
Client server network threat
Chapter1 intro network_security_sunorganised
MODELING THREATS HAER YERE SINIRR JKOA A
Lecture 01 Information Security BS computer Science
Introduction to cyber security.pptx
Website security
Unit 1 Network Fundamentals and Security .pptx

Similar to What is Linux SecuritySolutionLinux Security is a module in.pdf (20)

PPTX
Information Security introduction and management.pptx
DOCX
E commerce security 4
PPTX
Cyber Security: A Hands on review
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
PPTX
Information Systems.pptx
PPTX
SEMINAR ON CYBER SECURITY.pptx
PPTX
Security Operation Center Fundamental
PDF
Module -5 Security.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Ways to Safeguard Your Business from a Data Breach
PPTX
sec.This includes policy settings that prevent unauthorized people
PDF
Module 3-cyber security
PPTX
Information Security and Privacy-Unit-1.pptx
PPTX
Cyber Security and data Security for all.pptx
PDF
Ethical hacking and social engineering
PDF
Cybersecurity Interview Questions and Answers.pdf
DOCX
CCS354-NETWORK SECURITY-network-security notes
PPTX
information security (network security methods)
PPTX
Information security ist lecture
PDF
Network Security Unit 5.pdf for BCA BBA.
Information Security introduction and management.pptx
E commerce security 4
Cyber Security: A Hands on review
Top Cyber Security Interview Questions and Answers 2022.pdf
Information Systems.pptx
SEMINAR ON CYBER SECURITY.pptx
Security Operation Center Fundamental
Module -5 Security.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Ways to Safeguard Your Business from a Data Breach
sec.This includes policy settings that prevent unauthorized people
Module 3-cyber security
Information Security and Privacy-Unit-1.pptx
Cyber Security and data Security for all.pptx
Ethical hacking and social engineering
Cybersecurity Interview Questions and Answers.pdf
CCS354-NETWORK SECURITY-network-security notes
information security (network security methods)
Information security ist lecture
Network Security Unit 5.pdf for BCA BBA.
Ad

More from federaleyecare (20)

PDF
A ISCSI SAN consists of Select one or more A. HBA B. LUN C. Fibr.pdf
PDF
Which of the following statements about tRNA molecules is TRUEMul.pdf
PDF
Write a C program to simulate the description below using semaphores.pdf
PDF
When analyzing any particular primary source, historians must consid.pdf
PDF
What is the runtime complexity of Adams famous string splitter cod.pdf
PDF
What does personalized learning mean to you What does personal.pdf
PDF
What do patients in healthcare expect from their insurance company.pdf
PDF
Use Table A to find the number z such that the proportion of observa.pdf
PDF
Two of the main political systems are democracy and totalitarianism..pdf
PDF
The procedure of transferring journal entries to the ledger accounts .pdf
PDF
The ProblemUsing C programming language write a program that simul.pdf
PDF
5. Joe and Sam are using Public Key encryption. Joe’s public and pri.pdf
PDF
QUESTION 7 When using the indirect method to prepare the statement of.pdf
PDF
Q.1. Define noncontrolling (minority) interest. List three methods th.pdf
PDF
Picking a fruit-flavored or primary colored bean. overlapping event .pdf
PDF
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
PDF
Match the following Data vs Information Reliability as it adds value .pdf
PDF
Many organizations invest substantial resources in creating their ow.pdf
PDF
Lets compare and contrast the national cultures of Egypt and Brazi.pdf
PDF
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdf
A ISCSI SAN consists of Select one or more A. HBA B. LUN C. Fibr.pdf
Which of the following statements about tRNA molecules is TRUEMul.pdf
Write a C program to simulate the description below using semaphores.pdf
When analyzing any particular primary source, historians must consid.pdf
What is the runtime complexity of Adams famous string splitter cod.pdf
What does personalized learning mean to you What does personal.pdf
What do patients in healthcare expect from their insurance company.pdf
Use Table A to find the number z such that the proportion of observa.pdf
Two of the main political systems are democracy and totalitarianism..pdf
The procedure of transferring journal entries to the ledger accounts .pdf
The ProblemUsing C programming language write a program that simul.pdf
5. Joe and Sam are using Public Key encryption. Joe’s public and pri.pdf
QUESTION 7 When using the indirect method to prepare the statement of.pdf
Q.1. Define noncontrolling (minority) interest. List three methods th.pdf
Picking a fruit-flavored or primary colored bean. overlapping event .pdf
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
Match the following Data vs Information Reliability as it adds value .pdf
Many organizations invest substantial resources in creating their ow.pdf
Lets compare and contrast the national cultures of Egypt and Brazi.pdf
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdf
Ad

Recently uploaded (20)

PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
master seminar digital applications in india
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Lesson notes of climatology university.
PPTX
Presentation on HIE in infants and its manifestations
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Final Presentation General Medicine 03-08-2024.pptx
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
human mycosis Human fungal infections are called human mycosis..pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
01-Introduction-to-Information-Management.pdf
A systematic review of self-coping strategies used by university students to ...
GDM (1) (1).pptx small presentation for students
master seminar digital applications in india
Supply Chain Operations Speaking Notes -ICLT Program
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Lesson notes of climatology university.
Presentation on HIE in infants and its manifestations
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

What is Linux SecuritySolutionLinux Security is a module in.pdf

  • 1. What is Linux Security? Solution Linux Security is a module in a Linux Operationg System which gives Protection from security attacks and misuse of Operating Sysytem.It ensure Protection from the Enemy who's Bad Intention is to leak ,steal,change data or Hack your system. There are different types of security threat as follow: Reading data - Typically associated with espionage or theft, computer systems often contain information that needs to be kept confidential or secure. This could vary from emails discussing the price of a bid for a project to personal information or bank details. The disclosure of this information could severely damage the company or have legal implications Changing data - Potentially even more serious is that an attack could gain sufficient access to be able to update data. This could be for sabotage, as a means of discrediting the organisation or leaving a calling card. One of the biggest risks is that data could be modified and not noticed. The cases that tend to get a high profile in this area are where attackers replace web pages with their own modified versions. Denial of service - Denial of Service (DoS) attacks are where the attacker disables, or makes unusable the services provided by the system Access to computer - Whilst for some systems you may allow other users onto your system sometimes these user accounts could come under attack. The computer may not contain any confidential material and the user may not be able to write to any data however they could still use your system to cause damage. If someone manages to attack a computer that borders between a secure and insecure network then they could use your machine as a method of traversing between the two networks. Linux OS has Security Policy which ensure that you have covered all of the principles Authorisation, Authenticity, Privacy / Confidentiality, Integrity, Non-repudiation and Availability as they apply to your system. Also consider how this is going to be implemented by the users and system administrators. If a security process is hard to implement or restricts someone from doing their job then you may find that the process gets ignored or is not complied with. Linux security Policy Requriments according to Data Protection Act 1998 and ISO 7984-2 International Standards Organisation Security Standard are: Authorisation - Only allow those that need access to the data
  • 2. Authenticity - Verifying they are who they say they are Privacy / Confidentiality - Ensure personal information is not being compromised Integrity - Ensuring that the data has not been tampered with Non-repudiation - Confirmation that data is received. The ability to prove it in court Availability - Ensure that the system can perform it’s required function