SECURITY IN UNIX/LINUX OPERATING SYSTEMS: THEORETICAL APPROACHES AND LABORATORY PRACTICES FOR CYBERSECURITY
This article presents a comprehensive analysis of security principles in Unix/Linux operating systems, covering everything from theoretical foundations to the implementation of practical hardening cases. Key concepts such as authentication, authorization, discretionary and role-based access control are examined, as well as the issue of security in desktop operating systems and Unix/Linux environments, with special emphasis on the hardening process. It examines secure configuration principles, international standards such as CIS Benchmarks and DISA STIGs, and analyzes automated tools such as Lynis and OpenSCAP for vulnerability detection and remediation. It also discusses desktop hardening strategies based on the principle of least privilege, continuous updates, and proactive monitoring. Finally, results and recommendations for the implementation of robust security policies in organizational environments are presented.
SECURITY IN UNIX/LINUX OPERATING SYSTEMS: THEORETICAL APPROACHES AND LABORATORY PRACTICES FOR CYBERSECURITY
-
DOI: https://doi.org/10.22533/at.ed.3175925041214
-
Palavras-chave: RBAC, cybersecurity, hardening, shielding, operating system.
-
Keywords: RBAC, cybersecurity, hardening, shielding, operating system.
-
Abstract:
This article presents a comprehensive analysis of security principles in Unix/Linux operating systems, covering everything from theoretical foundations to the implementation of practical hardening cases. Key concepts such as authentication, authorization, discretionary and role-based access control are examined, as well as the issue of security in desktop operating systems and Unix/Linux environments, with special emphasis on the hardening process. It examines secure configuration principles, international standards such as CIS Benchmarks and DISA STIGs, and analyzes automated tools such as Lynis and OpenSCAP for vulnerability detection and remediation. It also discusses desktop hardening strategies based on the principle of least privilege, continuous updates, and proactive monitoring. Finally, results and recommendations for the implementation of robust security policies in organizational environments are presented.
- Lucia Muñoz Davila
- Nicolas Alonzo Gutierrez