Skip to main content

Initial idea 1

 I've been thinking about the topics I can choose for my Major project and found out that there is a topic I am interested in for quite a long time. I want to describe my idea here.

I have an idea to make a research in Linux security and find out how it differs from windows. A lot of people I am communicating with told me that Linux is used all around the world in security area. I want to find out why, understand the general idea of Linux and try to find the information about its weak points. I hope that during my first steps in this research I will find some more narrow and specific problems which I can make my project about

Linux is an open source operating system which means that all users can see not only its code but also modify it. It is considered to be a major advantage of an open-source system because the more people can observe the code, the more chance to spot the weaknesses before it is exploited appears. Also it gives a lot of space for other developers for customization and modification the system according to their needs (Heath, 2019).

(Kaspersky, 2021)

There are some essential differences between Windows and Linux that affect security significantly. One advantage of Linux is that it provides its users with software through command line. A lot of software is available for user in the repositories, thus, user does not have to search it on the internet. Generally, this is a safer method of downloading software and helps prevent viruses (Yaswinski, Chowdhury and Jochen, 2019). Nevertheless, not all software is available for the user in the repositories, for instance you cannot install Google Chrome on Ubuntu through command line and you have to download it on the internet. Google Chrome is a trustworthy application but you can never be sure about other applications you download (Yaswinski, Chowdhury and Jochen, 2019).

Linux is an open-source operating system which anybody is allowed to modify, hence, there are a lot of distributions, some of which are really popular. Many Linux distributions have focus as well, for instance Debian has excess for a large quantity of software which make it popular among programmers; Elementary OS is meant to be friendly for users migrating from Windows and Mac OS; ubuntu is mostly meant to be aesthetically pleasing and so on. There are also distributions which focus on penetration testing such as Kali Linux and Parrot Security OS.

(Nethserver, 2017)



                                                                    

References

Kaspersky, 2021. What Is Linux and Is It Really Secure?. [image] Available at: <https://www.kaspersky.com/resource-center/definitions/linux> [Accessed 6 October 2021].

Yaswinski, M., Chowdhury, M. and Jochen, M., 2019. Linux Security: A Survey. [online] Ieeexplore.ieee.org. Available at: <https://ieeexplore.ieee.org/abstract/document/8834112> [Accessed 12 October 2021].

Heath, N., 2019. What are open-source operating systems? Everything you need to know | ZDNet. [online] ZDNet. Available at: <https://www.zdnet.com/article/what-are-open-source-operating-systems-everything-you-need-to-know/> [Accessed 12 October 2021].

Nethserver.org, 2017. The Periodic Table of Linux Distros. [image] Available at: <https://community.nethserver.org/t/the-periodic-table-of-linux-distros/7941> [Accessed 12 October 2021].

Comments

  1. This could be an interesting area to explore and give you a wide range of potential research points. Try to think about at least one other possible theme for your project and get some initial research included before you make your choice this week.

    ReplyDelete

Post a Comment

Popular posts from this blog

Software review: Hashcat

In the following blogpost the way I used software called hashcat in my project is described. The example of using this software for dictionary attack is demonstrated. In my work I used information provided by Tavarez (2020) .   According to Porup (2020) hashcat is one of the most popular password crackers all around the world. Moreover, hashcat is included in the list of basic tools in Kali linux – linux distribution widely used by cybersecurity specialists. I installed Kali linux virtual machine in order to use this program and to show the example of a dictionary attack (Author's screenshot) However, before looking at the examples of using hashcat on practise, it is useful to understand in which areas hashcat is using. In plain words, hashcat is a password guesser which includes a number of features and pre-installed functionalities for cracking passwords by penetrating brute-force and dictionary attacks. The way it works is not too sophisticated, it hashes considerable numbe...

Major project theme

Every person has heard about how important it is to have a well-built strong password. An essential number of people would agree that password hygiene is as important as the personal hygiene is, since violation of first may lead to much more serious consequences. However, the statistics show that 59% of users use their names and dates of birth as their passwords, 43% shared their passwords with other people and only 45% would change a password after a breach (O’Driscoll, 2020). The aim of this post is to show how to create strong passwords. It is necessary to know how passwords are cracked in order to properly understand what password can be referred as strong one. There are to ways to execute an attack: online and offline.  Online attack is done by trying different passwords one by one through a normal log in process. Usually, such attacks are unsuccessful since they are easy to detect and block if necessary (Burnett and Kleiman, 2006).  I think everybody encountered situatio...