{"id":1388,"date":"2005-03-03T00:00:00","date_gmt":"2005-03-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/03\/linux-security-rough-around-the-edges-but-improving\/"},"modified":"2021-12-30T11:39:17","modified_gmt":"2021-12-30T11:39:17","slug":"linux-security-rough-around-the-edges-but-improving","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/03\/linux-security-rough-around-the-edges-but-improving\/","title":{"rendered":"Linux Security Rough Around The Edges, But Improving"},"content":{"rendered":"<p>The National Security Agency built a version of Linux with more security tools that its technologists believe could help make the country&#8217;s computing infrastructure less vulnerable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For more than a decade, the National Security Agency has worked on a way to use a computer&#8217;s operating-systems to control where software applications and their users can access data within IT environments.  The agency succeeded years ago in creating such &#8220;mandatory access control&#8221; features for specialized operating systems, but very few users had the access or inclination to deploy them.<\/p>\n<p>&#8220;Quality of (software) code is crucial to the security of this nation,&#8221; Dickie George, technical director of NSA&#8217;s Information Assurance Directorate, said Thursday at an SELinux symposium.  George added that the directorate&#8217;s mission is to research and develop the technology and processes that industry can use to protect itself, and critical U.S. infrastructure, from cyberattacks.<\/p>\n<p>Debian, Novell, and Red Hat, three major distributors of the Linux operating system, only have recently released their own packages built on version 2.6 that allow customers to take advantage of some SELinux features.<\/p>\n<p>Red Hat&#8217;s mid-February release of Red Hat Enterprise Linux 4&#8212;based upon the SELinux-friendly version 2.6 kernel&#8212;is an attempt to marry high-level security features with the basic operating system, says Donald Fischer, senior product manager for Red Hat Enterprise Linux.<\/p>\n<p>http:\/\/www.informationweek.com\/story\/showArticle.jhtml;jsessionid=5CWAFMGITIQIIQSNDBCCKH0CJUMEKJVN?articleID=60405086<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1388","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1388"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1388\/revisions"}],"predecessor-version":[{"id":3875,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1388\/revisions\/3875"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}