Abstract

The security of the configuration of files in the Linux operating system depends on many factors that can be referenced to the system level and the applicable level. The most important thing about the security of Linux operating systems is its dynamism, for example, when you secure your Linux system, it will not stay safe forever, because applications and cyber criminals through new threats and/or new exploits that are packaged Systems or applications that cause the operating system to become unsafe, for this reason, we need a secure operating system. The main purpose of this article is to provide a new way to enhance the security of the Linux operating system. For this purpose, how can simple, continuous, and practical Linux environment be secured, solutions are presented, also based on performance analysis of the proposed method and evaluation parameters for existing systems against the proposed system, the superiority of this method is introduced.

Highlights

  • Linux is an open source OS that makes changes free

  • Computer security is usually divided into three main distinct categories, which are usually referred to controls: [2] physical, technical, and administrative controls

  • Administrative security is the main objective of this article

Read more

Summary

1- Introduction

Linux is an open source OS that makes changes free. The term "computer security" covers a very large and wide range, including computing and processing information. One of the biggest problems for people seeking security in every field is their limited range of information about security in that area. [1] Security means separating assets from threats. Providing administrative security is nothing but defining the human factors of security This definition is how the user has access. 1-2- Confirmation of Practical Security Issues and Ideas There are a number of vulnerabilities in the Linux operating system, which requires looking at and finding a way to overcome these vulnerabilities. One of the ways to overcome the vulnerability is by setting security vulnerabilities in security settings Checking these security parameters using the command line environment is a very important and time-consuming task. The guidelines for security measures in large environments for managing Linux operating systems

2- Motivation
3- Background Research
9- Conclusion
10- References
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call