Linux distributions have for a long time been associated with enhanced computer security; this is related to the nature of the file format that the Linux kernel implements. Currently, however, security has become a major security concern when dealing with different Linux distribution. Security threats range from malware attacks to denial of services attack. Most Linux distribution provides security features that are used to protect the computer from different attacks. The most fundamental are SELinux.
SELinux
SELinus is a Red Hat distribution is package used to enhance security. This application implements mandatory access control architecture that provides access controls for files, users, processes and applications in the system (Hunter, 2004).
However, to provide more security their different other security measures that can be undertaken by the administrator:
Using Nmap scanner
The administrator can regularly scan the networks using the Nmap scanner to determine the available vulnerabilities. The Nmap tool can be able to map out all the possible hosts in a network even establish the operating systems. Using the tool hence, will help develop secure services and restrict unrequited services.
Using the Nessus scanner
The Nessus scanner is a Linux architecture plug -in used to scan both the system and the network. The scanner depends on the database to update its definitions of different threats. The scanners should be frequently updated and will feature full reporting, host scanning and real-time vulnerabilities. The tool if not well updates might return false positives. Apart from using these tools the administrator can enforce passwords, implement disaster preparedness and recovery plans and many other implementations that tailored towards providing security
SSH
Secure Shell (SSH) is a telnet method that is designed and created to provide secure access to computers that are remotely located.
The main advantage of using SSH is that it provides a secure communication through encryption of the data during transfer. However, the main disadvantage is performance problems, especially when tunneling TCP because there two layers ("SSH goes for IBM mainframe", 2005).
The SSH protocol works through connecting a client to the SSH server. The SSH authenticates that client via different method however the most common is password authentication.
References
Hunter, P. (2004). Linux security: Separating myth from reality. Network Security, 2004(8), 8-9. http://dx.doi.org/10.1016/s1353-4858(04)00116-3
SSH goes for IBM mainframe. (2005). Infosecurity Today, 2(1), 8. http://dx.doi.org/10.1016/s1742-6847(05)00151-5