Skip to main content
select distinct n.content as name, r.content as role, t.nameID as nameID, n.unitID as unitID, n.departmentID as departmentID, n.facultyID as facultyID, n.provinceID as provinceID, n.countryID as countryID from transaction as t, Name as n, Role as r where t.itemID='124471' and and

Vulnerability profile for Linux



เครือข่ายนักวิจัย+ผลงานวิจัย (full screen)


A system with efficient security tools is not secured if its operating system is vulnerable. Various Security enhancements for operating systems provide different security levels and profiles. Administrators have to choose the appropriate level or profile of protection for their systems. Our work attempts to systematically quantify the level of vulnerability for operating systems with a profiling scheme based on the severity of the attack as listed in the CVE. Linux, due to its open source nature, is used as a case study. Vanilla Linux, Linux with hardening, and Linux with LSM enhancement, are profiled and compared. © 2005 IEEE.

Security enhancement (2 items found) | Linux (29 items found) | CVE (7 items found) | Vulnerability profiling schemeComputer operating systems | Vulnerability profiling scheme | Vulnerability classification | Information technology | Severity of attack | Security of data | Security systems | Open systems | Os hardening |

ต้นฉบับข้อมูล : scopus