ADVANCE TECHNOLOGY FOR LINUX USER WITH BETTER SECURITY
نویسندگان
چکیده
Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and stretch, commencing from hackers. The coordination supervisor in authority for safekeeping packet. Underneath maximum system formations, operator appellations, open sesame, FTP / tel-net r-sh guidelines relocated documentations be able seized by everyone programmed identical environment. To overcome this problem or can use secure shell, FTP, file transfer protocol with transport layer security. operating protected more securely using above protocols. security of linux modules enhancement technique, trappings numerous measures avert unlicensed convention. safe keeping structural design rummage-sale called Flask, delivers a spotless different protection strategy implementation. This paper gestalt Flask architecture execution Linux.
منابع مشابه
Linux Security Modules: General Security Support for the Linux Kernel
The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced access control mechanisms have failed to win acceptance into mainstream operating systems due in part to a lack of consensus within the security community on the right solution. Since generalpurpose operating systems must satisfy a wide range of user requirements, an...
متن کاملPULSE: a Pluggable User-space Linux Security Environment paper
The discretionary access controls (DAC) employed by traditional operating systems only provide system administrators and users with a loose ability to specify the security policies of the system. In contrast, mandatory access controls (MAC) provide a stronger, finer-grained mechanism for specifying and enforcing system security policies. A related security concept called the principle of least ...
متن کاملUser-mode Linux
User-mode Linux is the port of the Linux kernel to userspace. It runs a Linux virtual machine in a set of processes on a Linux host. A UML virtual machine is capable of running nearly the same set of processes as the host. It lends itself to a variety of applications, such as kernel development, security applications like sandboxing and jailing, and virtual networking. This paper describes the ...
متن کاملMeeting Critical Security Objectives with Security-Enhanced Linux
Security-enhanced Linux incorporates a strong, flex ible mandatory access control architecture into Linux. It provides a mechanism to enforce the sep aration of information based on confidentiality and integrity requirements. This allows threats of tam pering and bypassing of application security mech anisms to be addressed and enables the confine ment of damage that can be caused by malic...
متن کاملEnd User Acceptance of Security Technology for Electronic Commerce
This paper examines the current advantages and limitations of the developing Global Information Infrastructure (GII) for commerce from the point of view of today’s players. It is based on the interim results of an Expert Survey being carried out as part of the ACTS project SEMPER (Secure Electronic Marketplace for Europe). The findings can be broadly categorised as ‘network’ and ‘non-network’ i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of advanced research
سال: 2021
ISSN: ['2707-7802', '2707-7810']
DOI: https://doi.org/10.21474/ijar01/12285