CFP last date
22 April 2024
Reseach Article

Linux Platforms as a Secure Desktop Solution

by Mohammed A. Afifi, Khawar Nehal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 3
Year of Publication: 2017
Authors: Mohammed A. Afifi, Khawar Nehal
10.5120/ijca2017913597

Mohammed A. Afifi, Khawar Nehal . Linux Platforms as a Secure Desktop Solution. International Journal of Computer Applications. 164, 3 ( Apr 2017), 9-11. DOI=10.5120/ijca2017913597

@article{ 10.5120/ijca2017913597,
author = { Mohammed A. Afifi, Khawar Nehal },
title = { Linux Platforms as a Secure Desktop Solution },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 3 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 9-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number3/27461-2017913597/ },
doi = { 10.5120/ijca2017913597 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:14.197122+05:30
%A Mohammed A. Afifi
%A Khawar Nehal
%T Linux Platforms as a Secure Desktop Solution
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 3
%P 9-11
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A lot of discussion goes into Enterprise Security, Network Security, and Computer Security. Initially, the most commonly used software are a combination of Operating systems, Desktop, and several standard applications like email clients, web browsers, word processing for document creating and editing. Now, the fact is that the listed common software combinations are the target of the most social engineered attacks, so selecting a secure combination for desktops shall go way far from these attacks into raising the security levels in many organizations. In this paper, we shall look at some of the configurations available in Linux platform that allows it to avoid and mitigate many of these common attacks which are considered to be the main cause of many security breaches.

References
  1. Thomas A Limoncelli, Robert Fulmer, Thomas Reingold, Alex Levine, and Ralph Loura. Aug 1998. Providing Reliable NT Desktop Services by Avoiding NT Server: Lucent Technologies, Bell Labs. https://www.usenix.org/legacy/publications/library/proceedings/lisa-nt98/full_papers/limoncelli/limoncelli.pdf
  2. UK Government. April 2014. Government Security Classifications.https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/251480/Government-Security-Classifications-April-2014.pdf
  3. UK Government. 2014. UK Gov. Security Assessment puts Ubuntu in First Place. https://insights.ubuntu.com/wp-content/uploads/226b/UK-Gov-Report-Summary.pdf
  4. Microsoft Corporation. June 2013. The File Checksum IntegrityVerifier.http://support.microsoft.com/kb/841290
Index Terms

Computer Science
Information Sciences

Keywords

Linux Linux platform Linux Distributions PC Linux Operating System (PCLOS) Desktop Solution Secure Desktop Operating Systems Network Security Computer Security UNIX PC Security Android Windows MacOS.