logo

Linux OS Security

   

Added on  2023-01-17

27 Pages1747 Words30 Views
Linux OS Security
NAME OF THE STUDENT
NAME OF THE UNIVERSITY
AUTHOR NOTE :
Linux OS Security_1
Table of Content
Introduction
Analysis on Linux-Based OS Security
Reason to build of Selected System architecture
Quality attributes for System architecture that is for success
Effect of Architecture and quality on the overall quality of system
Steps taken to improve the Quality attribute of the system.
Quality attributes that are affected
Trade-off made
Implication
Conclusion
References
Linux OS Security_2
Introduction
Linux is a well known operating system
that has been build for Intel 386 Pentium
based for IBM PCs.
Linux is mainly used for running powerful
set of compliers and programming tools
which is known to be free software
foundation.
The biggest plus point of Linux is all
about focusing the overall ability which
can co-exit with other operating system.
Linux OS Security_3
Analysis on Linux-Based OS Security
Operating system is known to be kernel of
the whole operating platform.
Linux operating system is considered to be
Linux kernel.
The present version which is being used is
2.6.22.6
In the year 1991, Linux kernel was released
for the very first system.
The biggest plus of Linux is ability to easily
co-exit with some of the other operating
system.
Linux OS Security_4
Analysis on Linux-Based OS Security
(Contd)
Linux is known to be a leading operating
system that comprises of server and other kind
of system like main computers.
It merely runs on coordinate system that
comes up with OS which is completely build
into microcode.
It is merely inclusive of android OS, Linux
derivate and network routers and smart
watches.
Linux OS Security_5
Analysis on Linux-Based OS Security
(contd)
Both modules and sub-system aim to provide
operating system which is needed for proper
functioning.
User Manner
Types of Process
Device Driver
Management of Memory
Networking
Linux OS Security_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment about Hard Disk Encryption
|4
|1401
|20