Show simple item record

dc.contributor Information Security
dc.creator Tanner, M. James
dc.date 2016-06-27T19:03:13Z
dc.date 2016-06-27T19:03:13Z
dc.date 2009-08-10
dc.date 2009-08-10
dc.date.accessioned 2023-03-03T07:27:12Z
dc.date.available 2023-03-03T07:27:12Z
dc.identifier eprint:418
dc.identifier http://hdl.handle.net/10919/71488
dc.identifier http://themicahjames.googlepages.com/main2
dc.identifier.uri http://localhost:8080/xmlui/handle/CUHPOERS/281972
dc.description Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not used to be such a prominent issue because computers were not connected 24/7, they used dialup and did not experience the effects from connecting to multiple computers. Today computers connect to high speed Internet and seem useless without access to email, chat, Internet, and videos. This interconnectedness of computers has allowed the security of many computers to be compromised because they have not been programmatically secured. The core component of computer security might best be done through security layers protecting the operating system. For this research, those who work in the computer field were asked to complete a survey. The survey was used to gather information such as the security layers and enhancements implemented on Linux computers and networks their surrounding network. This research is a stepping stone for further research as to what can be done to further improve upon security and its current implementations.
dc.description Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today.
dc.format 72 pages
dc.format application/pdf
dc.format application/pdf
dc.language en
dc.rights In Copyright
dc.rights http://rightsstatements.org/vocab/InC/1.0/
dc.subject Linux security layers
dc.subject Information Security
dc.subject Linux System administrators
dc.subject T1
dc.title Security By Design
dc.type Thesis


Files in this item

Files Size Format View
418_1.pdf 449.0Kb application/pdf View/Open

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse