International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 04 | Apr -2017
www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
Workstation and Network Security in Linux OS Pramod Nimbalkar1, Sagar kawade2, Krishi Sharma3 , Neeraj Khairwal4 1Pramod Nimbalkar: Dept. of Information Technology, VIT Mumbai, Maharashtra, India 2Sagar Kawade: Dept. of Information Technology, VIT Mumbai, Maharashtra, India 3Krishi Sharma: Dept. of Information Technology, VIT Mumbai, Maharashtra, India 4Neeraj Khairwal: Professor, Dept. of Information Technology, VIT Mumbai, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract
- To keep track of personal information and run businesses, system needs powerful, networked computers. In industries network and computer security is important. Now a day’s because of the popularity of internet, there is need of data security. Also most organizations are dynamic in nature hence the need for secure computing environments.
Although not the dominant operating system on the Internet, Linux is quite prevalent, considering that the very strong for servers running web services, email services, and name services because all depend on open-source code that works with Linux. And this is where the trouble begins. So there is need to secure Linux operating system. The security of Linux depends on many configuration files both at system level and application level. Once you secure your Linux system it does not perpetually stay secure because operational and functional changes will be done through threats or new exploits are available for packages or applications. Hence Workstation and network security for the Linux os will be implemented through scripting.
Key Words: vulnerability, workstation, scripting, network, log analysis.
1) Physical 2) Technical 3) Administrative Physical Controls: Physical control is the implementation of security measures to prevent unauthorized access to sensitive material .Examples of physical controls are : Closed-circuit surveillance cameras, Motion or thermal alarm systems, Security guards, Picture IDs, Locked and dead-bolted steel doors. Technical Controls: Technical controls use technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. Examples of technical controls are: Encryption, Smart cards, Network authentication, Access control lists (ACLs), File integrity auditing software.
Administrative Controls:
1.INTRODUCTION Computer security is a general term that covers a wide area of computing and information processing. The biggest problem of people is securing anything in the very narrow scope. They are not sure about what to secure and how to secure it. This is because people don’t fully understand what security is? But most likely it is because security is such a loaded word that it can mean too many things. Computer security is often divided into three distinct master categories, commonly referred to as controls. Objectives of these
© 2017, IRJET |
controls are proper security implementation:
Administrative controls define the human factors of security. It determines which users have access to what resources and information by such means as: Training and awareness, Personnel registration and accounting. It is nothing but keep on watching what is going in your system that means keep updated status of your system. General perspective about Linux is that it is quite a secure operating system. But in technical perspective, the security of Linux depends on many
Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1