ADVANCE TECHNOLOGY FOR LINUX USER WITH BETTER SECURITY

نویسندگان

چکیده

Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and stretch, commencing from hackers. The coordination supervisor in authority for safekeeping packet. Underneath maximum system formations, operator appellations, open sesame, FTP / tel-net r-sh guidelines relocated documentations be able seized by everyone programmed identical environment. To overcome this problem or can use secure shell, FTP, file transfer protocol with transport layer security. operating protected more securely using above protocols. security of linux modules enhancement technique, trappings numerous measures avert unlicensed convention. safe keeping structural design rummage-sale called Flask, delivers a spotless different protection strategy implementation. This paper gestalt Flask architecture execution Linux.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linux Security Modules: General Security Support for the Linux Kernel

The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced access control mechanisms have failed to win acceptance into mainstream operating systems due in part to a lack of consensus within the security community on the right solution. Since generalpurpose operating systems must satisfy a wide range of user requirements, an...

متن کامل

PULSE: a Pluggable User-space Linux Security Environment paper

The discretionary access controls (DAC) employed by traditional operating systems only provide system administrators and users with a loose ability to specify the security policies of the system. In contrast, mandatory access controls (MAC) provide a stronger, finer-grained mechanism for specifying and enforcing system security policies. A related security concept called the principle of least ...

متن کامل

User-mode Linux

User-mode Linux is the port of the Linux kernel to userspace. It runs a Linux virtual machine in a set of processes on a Linux host. A UML virtual machine is capable of running nearly the same set of processes as the host. It lends itself to a variety of applications, such as kernel development, security applications like sandboxing and jailing, and virtual networking. This paper describes the ...

متن کامل

Meeting Critical Security Objectives with Security-Enhanced Linux

Security-enhanced Linux incorporates a strong, flex­ ible mandatory access control architecture into Linux. It provides a mechanism to enforce the sep­ aration of information based on confidentiality and integrity requirements. This allows threats of tam­ pering and bypassing of application security mech­ anisms to be addressed and enables the confine­ ment of damage that can be caused by malic...

متن کامل

End User Acceptance of Security Technology for Electronic Commerce

This paper examines the current advantages and limitations of the developing Global Information Infrastructure (GII) for commerce from the point of view of today’s players. It is based on the interim results of an Expert Survey being carried out as part of the ACTS project SEMPER (Secure Electronic Marketplace for Europe). The findings can be broadly categorised as ‘network’ and ‘non-network’ i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of advanced research

سال: 2021

ISSN: ['2707-7802', '2707-7810']

DOI: https://doi.org/10.21474/ijar01/12285