Go2Linux Proposal: Implementing Linux for Faster Computing (Project)

Verified

Added on  2022/09/27

|4
|1401
|20
Project
AI Summary
This document presents a detailed Linux implementation proposal created by Go2Linux for Faster Computing. It addresses key concerns regarding Linux adoption, including security implementation through hard disk encryption, SELinux, and Grsecurity, along with network security measures like Netfilter, Iptables, and intrusion detection using Snort. The proposal also outlines solutions for end-user tasks such as email and web browsing, emphasizing the availability of applications like Chrome, Firefox, and alternatives to Microsoft Office. It further covers process monitoring and management, logging mechanisms, and a comparison of Ubuntu with other Linux distributions. The proposal details software installation methods, including package managers and application stores, and provides strategies for integrating Linux with existing Windows systems, including file sharing through services like Dropbox and SAMBA servers. The document concludes with a recommendation for Faster Computing to adopt Linux, highlighting its maturity and resemblance to Windows, and includes references to support the proposal.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
<insert date>
Go2Linux, Inc.
<Student Name>
<Address>
Respected Sir/Madam,
I Hope this email finds you well. In this e-mail, I will talk in brief about some of the most
pressing concerns related to Linux that will help you clear your mind, if you had any
doubts. Without further ado, let’s begin.
How will you implement security in the Linux systems?
o Hard Disk Encryption
The Hard Disk in which the OS to be configured is to be protected with the first
launch. It is recommended to have a partitioned Full diskLVM setup with a strong
Passphrase to secure the disk. Distinct partitions are created for /usr, /var, /home
and/, thereby ensuring files and device binaries are kept segregated.
o SELinux
Security Enhanced Linux (SELinux) is type of a fine-grained Mandatory Access
Control (or also known as MAC) architecture intended to fulfill a wide variety of
security needs, from regular use to military and government applications that
handle sensitive information.
o Grsecurity
Grsecurity is a series of fixes for the Linux kernel that uses RBAC - Position
Based Access Control to highlight security improvements. RBAC seeks to limit
access to the network above what is usually offered by UNIX authentication lists,
with the goal of developing a completely low-privilege environment where
individuals as well as processes have the bare minimal rights to function properly
but nothing more.
o Filesystem Security
A stable structure needs a strong base or it would collapse. For the case of Linux
this will be the filesystem ext (EXTended, Version). Documents and folders
provide sets of privileges for both the file creator, the party affiliated with the file,
as well as all device users. Implementing Access control list, then Extended
Attributes as well as File system restrictions and controls will help protect the
filesystem.
o Linux SSH
Safeguarding the Root account for SSH is by far the most crucial thing about
every Linux system, as compromising the Root account leads to increased harm
to the entire file system. Root account remote access has to be deactivated for a
stable Linux machine. A linux system forwarding leads to easy attacks.
Therefore in /etc / ssh / sshd config, preserve
# X11 NO
# PubkeyAuthentication NO
o Network security
Linux does have a very robust and powerful network stack that supports a lot of
protocols including capabilities. Netfilter is a mechanism of the IP protocol stack
that catches packets going to, and from the network. Iptables is another such
module that incorporates an IPv4 firewalling mechanism, which is operated
through the iptables userland application. The network stack also contains an
IPsec module, which offers security, validity and IP networking integrity defense.
It could be used to enforce VPNs, as well as to link to authentication as well.
<insert logo, if desired>
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
o Snort - intrusion detection
Snort's network-based opensource intrusion detection software (NIDS) is
capable of performing real-time traffic monitoring including packet monitoring on
IP networks. The below commands helps monitor as well as log the network
attacks.
# ifconfig eth1 up -arp
# service snort start
# snort -i eth1 -v
End users have expressed some concern about completing their day-to-day tasks
on Linux. How would activities such as email/web browsing work? How would
they work with their previous Microsoft Office files?
o Linux has matured as a platform and now lots of applications are available for
Linux. At the same time, day to day operations with Linux are not much different
than that of Windows.
o For instance, latest revisions of Ubuntu now come with Task switcher, application
drawer, start menu like interface, tab management and so on. At the same time,
common applications that are available for other platforms are also available for
Linux. For instance, both Chrome and Firefox is available for Linux which are
among the most popular browsers in the world and work similar to how they work
on Windows.
o Also, Microsoft does not make Office for Linux, but there are alternatives such as
Libre office which can open and edit office files. Apart from that, there is
something called as ‘Wine’ that allows Microsoft office installation on Linux.
The current Windows administrators are unsure about administering Linux
systems. How are common tasks, such as process monitoring and management,
handled in Linux? How does logging work? Do we have event logs like we do in
Windows?
o Process is also managed in Linux like the same way it is managed for Windows.
There are foreground processes and there are background processes.
o Simultaneously, process management can be invoked using the terminal and
Linux distros like Ubuntu also have built in task manager for managing
processes.
Some folks in IT raised questions about the Linux flavor that was recommended.
They would like to see comparisons between your recommendation and a couple
of other popular options. What makes your recommendation the best option?
o Ubuntu is among the most popular distros available for Linux. There are multiple
benefits of using Ubuntu over other distros.
o The first ones being that there is something called as Livepatch in Ubuntu that
eases the updating and patching of Linux operating system [1, pp. 20–28].
o At the same time, there are other benefits such as a dedicated application
drawer, task navigation, application switching, built-in application store and
longer supports if LTS variant is chosen.
o
How does software installation work on Linux? Can we use existing Windows
software?
o There are different package managers in Linux that handle application installs.
However, focusing on Ubuntu only, there are multiple ways wherein one can
install application.
Document Page
o The first and foremost is the terminal command ‘Apt’ followed by the application
name.
o The second is to get application from the built-in application stores.
o Third are software directories such as ‘sourceforge’, ‘fosshub’ and developers
own websites. Many applications that are available for Windows also are
available for Linux, however, some applications that are only on Windows can
still be installed by using a third party emulation application such as ‘Wine’ [2]
How can Linux work together with the systems that will continue to run Windows?
How will we share files between the different system types?
o As mentioned previously, the applications that are supported on both the
platforms will continue to output files that are supported on both the platforms.
o At the same time, some applications can be forced installed on Linux using a 3rd
party emulation software.
o Apart from that, the file sharing can be made possible using 3rd party service
such as Dropbox, Google Drive, cloud storage providers such as AWS and even
direct windows to Linux file sharing using SAMBA servers [2].
As mentioned in the memo, Linux (Ubuntu) is now a matured platform and closely resembles
the likes of Windows. We believe, your organization will benefit by adopting it.
Warm regards,
<Student Name>
Go2Linux
Linux Deployment Manager
Document Page
References
<These example citations use IEEE style. Ask your instructor for clarification on the style
to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.>
[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online].
Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm
l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_
Encryption. [Accessed December 1, 2019].
[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online].
Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed
December 6, 2019].
… and so on ...
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]