Essay about Security Enhanced Linux (Selinux), Chroot Jail, and Iptables

Decent Essays
Security Enhanced Linux (Selinux), Chroot Jail, and Iptables

Security Enhanced Linux (Selinux), Chroot Jail, and Iptables
Three of the most important types of Linux security technologies are Security Enhanced Linux (SELinux), chroot jail, and iptables. This security measures aide in the subversion of theft and malicious activity. We will discuss these items in depth to address who created them and for what reason. Along with how these technologies changed the operating system to enforce security, and the types of threats that these security systems are design to eliminate.
Security Enhanced Linux was released in December of 2000 from the National Security Agency (NSA), under the GNU general public license. SELinux is not a Linux
…show more content…
This user has root privileges for his or her own account, but can’t access higher directories or be aware of their existence. Virtualization is great for test environment that can be set up in the chroot for software that might be too risky to deploy on a production system. Virtual environments are often used for compatibility issues. Legacy software or software using a different interface must sometimes be run in a chroot because their supporting libraries or files may otherwise clash with those of the host system. Also chroot is often used for recovery purposes. A chroot can be used to move back into a damaged environment after bootstrapping from an alternate root file system.
Elevated Privileges in iptables are required for operation, and root user must be used or iptables will not function. With most Linux systems, iptables is installed as /usr/sbin/iptables and documented in its man page, which can be opened using man iptables. There is a set of user interface tools that can be used to manage your system’s security profile in a more user friendly manner. The user interface firewall management tools include Bastille, and GUI tools with like KDE’s Guard dog. There are Linux distributions whose main purpose is to provide a GUI front end to iptables with a variety of configurations.
Iptables allows the system administrator to define tables containing chains of rules for the treatment of packets. Each table is associated with a
Get Access