Question

Q1. Using a GUI can pose a security risk. Why is this so? One reason is...

Q1. Using a GUI can pose a security risk. Why is this so? One reason is that every time you add more
software to the system, you add a potential security risk. Find some articles that discuss this topic and write a
two-page summary of the opinions.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:-

  • Home
  • Memory
  • Creativity
  • Reading
  • Hypnosis
  • Mind Map
  • More Education
  • Contact

BrainDirector

The Strongest Brain Training Community

  • Our Mission
  • Teach With Us
  • From The CEO
  • Women
  • Food
  • Submit Your Content
  • Our Youtube Channel

Home » IT And Security » You are reading »

Learning Linux (An Introduction For Newbies)

The Writer August 19, 2018 Learning Linux (An Introduction For Newbies)2018-08-19T07:56:07+00:00IT And Security 0 Comments

In this topic we are going to introduce you to some of the core topics of linux which will help you start learning Linux the right way and in the upcoming articles we will be providing even more in-depth information on linux. Let’s start with what we have for today.

Linux is an operating system, much like Microsoft Windows. However, this is a very simplistic way of defining Linux. Technically, Linux is a software component called the kernel, and the kernel is the software that controls the operating system.

By itself, the kernel doesn’t provide enough functionality to provide a full operating system. In reality, many different components are brought together to define what IT professionals refer to as the Linux operating system.

It is important to note that not all the components described in the figure above are always required for a Linux operating system. For example, there is no need for a graphical user interface (GUI). In fact, on Linux server systems, the GUI is rarely installed because it requires additional hard drive space, CPU cycles, and random access memory (RAM) usage. Also, it could pose a security risk.

You may wonder how GUI software could pose a security risk. In fact, any software component poses a security risk because it is yet another part of the operating system that can be compromised. When you set up a Linux system, always make sure you only install the software required for that particular use case.

The pieces of the Linux operating system shown in figure above are described below:

User utilities

Software that is used by users. Linux has literally thousands of programs that either run within a command line or GUI environment. Many of these utilities will be covered in our upcoming articles.

Server software

Software that is used by the operating system to provide some sort of feature or access, typically across a network. Common examples include a file-sharing server, a web server that provides access to a website, and a mail server.

Shells

To interact with a Linux operating system via the command line, you need to run a shell program. Several different shells are available.

File systems

As with an operating system, the files and directories (aka folders) are stored in a well-defined structure. This structure is called a file system. Several different file systems are available for Linux.

The kernel

The kernel is the component of Linux that controls the operating system. It is responsible for interacting with the system hardware as well as key functions of the operating system.

Kernel modules

A kernel module is a program that provides more features to the kernel. You may hear that the Linux kernel is a modular kernel. As a modular kernel, the Linux kernel tends to be more extensible, secure, and less resource intensive (in other words, it’s lightweight).

GUI software

Graphical user interface (GUI) software provides “window-based” access to the Linux operating system. As with command-line shells, you have a lot of options when it comes to picking a GUI for a Linux operating system.

Libraries

This is a collection of software used by other programs to perform specific tasks.

Device files

On a Linux system, everything can be referred to as a file, including hardware devices. A device file is a file that is used by the system to interact with a device, such as a hard drive, keyboard, or network card.

Linux Distributions

The various bits of software that make up the Linux operating system are very flexible. Additionally, most of the software is licensed as “open source,” which means the cost to use this software is often nothing. This combination of features (flexible and open source) has given rise to a large number of Linux distributions.

A Linux distribution (also called a distro) is a specific implementation of a Linux operating system. Each distro will share many common features with other distros, such as the core kernel, user utilities, and other components. Where distros most often differ is their overall goal or purpose. For example, the following list describes several common distribution types:

Commercial

A distro that is designed to be used in a business setting. Often these distros will be bundled together with a support contract. So, although the operating system itself may be free, the support contract will add a yearly fee. Commercial releases normally have a slower release cycle (3–5 years), resulting in a more stable and secure platform. Typical examples of commercial distros include Red Hat Enterprise Linux and SUSE.

Home or amateur

These distros are focused on providing a Linux operating system to individuals who want a choice that isn’t either macOS or Microsoft Windows. Typically there is only community support for these distros, with very rapid release cycles (3–6 months), so all of the latest features are quickly available. Typical examples of amateur distros include Fedora, Linux Mint, and Ubuntu (although Ubuntu also has a release that is designed for commercial users).

Security enhanced

Some distributions are designed around security. Either the distro itself has extra security features or it provides tools to enhance the security on other systems. Typical examples include Kali Linux and Alpine Linux.

Live distros

Normally to use an operating system, you would first need to install it on a system. With a Live distribution, the system can boot directly from removable media, such as a CD-ROM, DVD, or USB disk. The advantage of Live distros is the ability to test out a distribution without having to make any changes to the contents of the system’s hard drive. Additionally, some Live distros come with tools to fix issues with the installed operating system (including Microsoft Windows issues). Typical examples of Live distros include Manjaro Linux and Antegros. Most modern amateur distros, such as Fedora and Linux Mint, also have a Live version.

Add a comment
Know the answer?
Add Answer to:
Q1. Using a GUI can pose a security risk. Why is this so? One reason is...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Discussion Topic: When performing an audit, auditors are especially concerned about engagement risk. For this reason,...

    Discussion Topic: When performing an audit, auditors are especially concerned about engagement risk. For this reason, they perform main activities to reduce engagement risks. Further, the auditing standards require auditors to understand the client's business, and its environments, and its internal controls when planning the audit so that they could better plan the nature, timing, and extent of the audit. Required: 1. Discuss why the auditor would be concerned about engagement risk and identify two or more activities the auditors...

  • 1. Open a new Microsoft Word document, and enter your answer to one of the prompts...

    1. Open a new Microsoft Word document, and enter your answer to one of the prompts below: a. Select two articles from the RSS feed, one that details a recent attack and one that explains a new stronger security technology or procedure. Summarize each article and include a concluding paragraph that explains how you as a security professional would use this information. b. Scan the articles that appeared over the last two weeks. Use those articles to create your own...

  • Assignment 1 Risk Management It is an accepted truth that without risk there can be no gain. Every individual and organization must take some risks to succeed. Risk management is not about avoiding risks, but about taking risks in

    Assignment 1Risk ManagementIt is an accepted truth that without risk there can be no gain. Every individual and organization must take some risks to succeed. Risk management is not about avoiding risks, but about taking risks in a controlled environment. To do this, one must understand the risks, their triggers, and their consequences.Write a 3–4 page paper in which you:1. Define clearly risk management and information security and discuss how information security differs from information risk management.2. Explain security policies and how they factor...

  • Q: Complete the following "Reason column" for your software engineering risk analysis project. Please Note that...

    Q: Complete the following "Reason column" for your software engineering risk analysis project. Please Note that there is a sample for filling the reason column please see it. Risk Probability Effects Reason Organizational financial problems force reductions in the project budget (7). Low Catastrophic It is impossible to recruit staff with the skills required for the project (3). High Catastrophic Key staff are ill at critical times in the project (4). Moderate Serious Faults in reusable software components have to...

  • 1. In lectures we discussed two examples of reverse engineering that led to the disclosure of...

    1. In lectures we discussed two examples of reverse engineering that led to the disclosure of security loopholes in public transport systems (one in NZ and one in Australia). These are part of a more general phenomenon. Frequently, companies and governments learn about potential security issues through the activities of independent engineers. Suppose you, as a professional software engineer, uncover security vulnerabilities in a company's software (let's assume that it is not a company that you work for). Discuss what...

  • Discuss some of the biological reasons why psychoactive drugs may be so compelling to the user,...

    Discuss some of the biological reasons why psychoactive drugs may be so compelling to the user, and why cessation of use (quitting) may be so difficult. Influences you might address include addiction, neuroadaptation, tolerance, permanent or relatively permanent changes in the brain/body, etc. Feel free to use sources/evidence to support your point including examples, scholarly articles or videos, your textbook, personal experience, etc. Please post your initial response by the end of our in-person class time to allow others time...

  • Can someone pls help me with this, I have exams today on another subject so I'm...

    Can someone pls help me with this, I have exams today on another subject so I'm more focus on that over this, but unfortunately this is due today. - Choose a common or current controversial issue in healthcare or Nursing. Formulate a question about the topic that can research. For example, access to health insurance has been a pressing issue for the past several years. - Once you've formulated your question, conduct some research to find answer. What answers did...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Read the blew article and respond to it using your opinion? One reason why it is...

    Read the blew article and respond to it using your opinion? One reason why it is very important to understand your audience before delivering a speech is because you can adapt your speech to their attitudes. This will allow the speaker to figure out the best way to reach their intended goals for their speech. For example, if you are trying to convince the community to build a waterpark and prior to your speech, you knew that the community was...

  • Which of the six risks should be considered a significant​ risk? Explain why they represent a...

    Which of the six risks should be considered a significant​ risk? Explain why they represent a significant risk. For each risk that you identified as a significant​ risk, describe how you might address the risk to give it special audit consideration. For​ example, a valuation risk might be addressed by engaging a valuation specialist. Begin by determining which of the six risks should be considered a significant risk.​ Then, for each risk that has been identified as a significant​ risk,...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT