StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

SECURITY ISSUES IN RED HAT ENTERPRISE LINUX - Dissertation Example

Cite this document
Summary
According to the research findings to supply a complete server the company need to introduce in the practical use more security principles and configurations, such as: security policy for the Web service, Mail, FTP, Samba, NFS, DHCP, Squid, SSH, VPN…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
SECURITY ISSUES IN RED HAT ENTERPRISE LINUX
Read Text Preview

Extract of sample "SECURITY ISSUES IN RED HAT ENTERPRISE LINUX"

Download file to see previous pages

The intention of this study is security as a key concern for enterprise Information technology (IT) managers with a regular apprehension to keep the systems properly updated and configured to prevent unwarranted exploitation from outsiders. OpenSCAP implements an open Source of Security Content Automation Protocol (SCAP) framework for creation of uniform approach for maintains secure systems. A lot people are paying a lot attention on security matters particularly in governments to ensure their systems are well guarded and are not exposed to uncalled for bugs and exploits.

With OpenSCAP, the open source community is leveraging a number of different components from the security standards ecosystem to enable the framework. In order to avoid all sorts of attacks, this research indicates some security issues of the system and software configurations in the Red Hat Enterprise Linux (RHEL) such as OpenSCAP, Security Audit system and some OpenSCAP tools, which play a vital role in the Linux security domain. Grasping these skills not only can help the administrator defend from the potential security risk making the environment more secure but also can understand the concepts of security deeply promoting the development of computer security.

The world of computer security has changed dramatically in the last few years, and one of the greatest challenges now facing CIOs and IT directors is the task of maintaining the security of their IT environments. The effects of a security breach can be catastrophic, including unplanned downtime and the resulting loss of service, a potentially significant financial impact, and the loss of sensitive and confidential information. This problem has been compounded by the proliferation of networked PCs and servers as well as the growing intelligence of malicious software that seeks to exploit and expand throughout the Internet infrastructure.

Companies such as Red Hat are releasing new technologies and tools to address the needs of system administrators responsible for managing the security of large numbers of geographically dispersed systems. For example, technologies such as Position Independent Executables (PIE) and Exec Shield help protect against buffer overflows, a tactic frequently employed by attackers to infiltrate and compromise flawed software programs. Another technology, Security Enhanced Linux (SELInux) prevents users and applications from damaging an entire system by enforcing security policies at the kernel level (Farrell, 2003).

On the tools front, Red Hat Network, a key part of Red Hat Enterprise Linux, provides system administrators a way to review information about security vulnerabilities and proactively apply relevant security measures and other updates to large numbers of Red Hat Enterprise Linux systems easily and efficiently. With recent technologies, applications can be shielded in environments which do not expose them to: Potential flaws that may be inherent in the application

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“SECURITY ISSUES IN RED HAT ENTERPRISE LINUX Dissertation”, n.d.)
Retrieved from https://studentshare.org/information-technology/1393007-security-issues-in-red-hat-enterprise-linux
(SECURITY ISSUES IN RED HAT ENTERPRISE LINUX Dissertation)
https://studentshare.org/information-technology/1393007-security-issues-in-red-hat-enterprise-linux.
“SECURITY ISSUES IN RED HAT ENTERPRISE LINUX Dissertation”, n.d. https://studentshare.org/information-technology/1393007-security-issues-in-red-hat-enterprise-linux.
  • Cited: 0 times

CHECK THESE SAMPLES OF SECURITY ISSUES IN RED HAT ENTERPRISE LINUX

Analysis of Red Hat Linux Operating System

KDE uses a file management and web browser called Konqueror, which is a standard setting in red hat installations.... This paper ''Analysis of red hat Linux Operating System'' discusses that the one distribution of Linux in particular, known as red hat, is a popular Unix-like version of Linux that allows users to enjoy all of the working components of their electronic devices under an open source license.... hellip; The history of red hat is central to the history of Linux distributions emerging from the 1990s, including making milestones in the advancement of open source operating systems....
7 Pages (1750 words) Article

Comparing Linux Server and Workstation Products

They are as follows: Workstations Specifications Basic Workstation Dual CPU supports, memory support is unlimited, no virtualization available Multi OS Workstation Dual CPUs, unlimited memory, and virtualization available Server Specifications red hat enterprise linux Dual CPU server supports.... red hat Linux Inc.... Enterprise version of red hat supports both server and workstation systems, which eradicates the compatibility issues that could have occurred if other versions may have used....
4 Pages (1000 words) Assignment

Virtualization and Computers

ConclusionTASK 8: Research Paper(SEARCH BELOW)HOW VIRTUALIZATION CHANGES THE COMPUTER WORLD: A Focus on the Discussion of the Facts Behind the Application of the linux Virtual ServerIntroduction Computers and the benefits... The Penguin Atlas of Media and Information: Key issues and Global Trends (Penguin Reference)....
12 Pages (3000 words) Essay

The Importance of Ethics in the Field of Information Technology

This report “The Importance of Ethics in the Field of Information Technology” is intended to make the top management of our institution aware of the importance of licensed software use in our institution.... The students and the public are well aware of the importance of ethical standards....
23 Pages (5750 words) Assignment

Development and History of Unix and Linux

This coursework "Development and History of Unix and linux" focuses on the significance of UNIX certification regarding linux, which is considered a non-issue.... One can therefore state that UNIX and linux are different software.... Some of the current key commercial Unixes include IBM's....
7 Pages (1750 words) Coursework

Linux Server Environment

The paper "linux Server Environment" discusses that linux's biggest advanatage is that it is is free.... hellip; linux server environment can be relatively unfriendly to gamers because most new games are commercial hence not possible to reproduce in a linux environment.... The introduction of linux environment in a corporate world is also not easy since most workers are acquainted with the Windows environment and Microsoft programs (Bradford & Mauget, 2002)....
5 Pages (1250 words) Case Study

Operating Systems: Windows and Linux

The next release, Windows Vista, was a failure because of high system requirements and severe performance and security issues.... "Operating Systems: Windows and linux" paper compares two world's leading desktop Operating Systems considering the OS features such as application software availability, system requirements, end-user training needs, and security to identify the more effective OS in a business environment.... However, modern business networks are becoming increasingly vulnerable to malware attacks due to security system flaws and careless employee behavior....
8 Pages (2000 words) Case Study

Integrating Mobile Device Management

Android has its basis as linux kernel and this operating system is designed mostly for devices which use touch screen such as smartphones (Zheng, 2006).... Due to the security features incorporated into the solution, the developers have made requests to the government of the United States and the Department of Defense so that they can receive the green light for the solution to be applied in a highly regulated enterprise environment as well as by government agencies (Gralla & Lindley, 2006)....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us