O'Reilly logo

Security Strategies in Linux Platforms and Applications by Michael Jang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Kernel Security Risk Mitigation

THIS CHAPTER IS ALL ABOUT THE KERNEL, the essence of the Linux operating system. Because the kernel is highly configurable, it represents an opportunity to better secure your systems. Unfortunately, it also a chance for black-hat hackers to take advantage of mistakes made by users who are less skilled at kernel configuration.

Because of the complexity of the kernel, most Linux professionals rely on kernels configured by reliable developers. Many such developers work for the corporate sponsors of a distribution such as Red Hat, Novell, or Canonical (Ubuntu). Corporate Linux kernel developers start with the work of the volunteer developers affiliated with the Linux Kernel Organization. The stock kernel ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required