Methodological approaches to the security of virtual and physical servers based on OS Linux
Закрыть
Articolul precedent
Articolul urmator
353 8
Ultima descărcare din IBN:
2023-03-21 15:15
SM ISO690:2012
CERBU, Anatol, GRECHIN, Dorin. Methodological approaches to the security of virtual and physical servers based on OS Linux. In: Mathematics and Information Technologies: Research and Education, Ed. 2021, 1-3 iulie 2021, Chişinău. Chișinău, Republica Moldova: 2021, p. 100.
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Mathematics and Information Technologies: Research and Education 2021
Conferința "Mathematics and Information Technologies: Research and Education"
2021, Chişinău, Moldova, 1-3 iulie 2021

Methodological approaches to the security of virtual and physical servers based on OS Linux


Pag. 100-100

Cerbu Anatol, Grechin Dorin
 
Technical University of Moldova
 
 
Disponibil în IBN: 1 iulie 2021


Rezumat

Information security has become a topic of growing interest not only in the Linux community, but in all areas of information technology. As the Internet develops, there is an increase of number of Linux servers, as well as Linux vulnerabilities that are made public. A Linux user has a wide variety of tools and techniques to protect against most types of intrusions. Unfortunately, there is no a secure system. Nevertheless, by improving network security measures as well as their proper implementation, the system has become a more difficult target to break its security. Linux [1] has a series of features: - Flexibility: Linux is flexible because it supports high-performance server applications, desktop applications, and embedded systems. - Stability: In the Linux system, if a new program or software is installed, it does not require periodic restart. therefore, it maintains the performance level of the system. - Performance: does not degrade the performance level of the system, even if it manages a large number of users simultaneously. - Network compliance: Linux is an easy-to-use operating system in terms of network functionality because it can be easily configured. Server security requirements [1] fall into one of the following categories: - Data confidentiality; - Data integrity; - User authentication and access control; - Availability of data and services. As the cost of maintaining effective security is constantly rising, server administrators have decided to migrate private infrastructure to Linux operating systems. In order to maintain effective security we cannot claim that the information is in the security of a perfect defensive system regardless of all its facilities, therefore the ability of any security configuration must include the adaptability of the infrastructure according to new attacks and stress-tests to reduce detected vulnerabilities.