27.08.2015 Views

Introduction to SELinux

Introduction to SELinux

Introduction to SELinux

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Is this enough?<br />

• Activites and the traditional security model<br />

solves a lot of the problems…<br />

• But what, if an attack is successful?<br />

• What about misconfiguration?<br />

• What about treacherous users?<br />

Objective: Reduce the remaining risk by limiting the<br />

potential damage caused by the failure of these security<br />

mechanisms<br />

A Manda<strong>to</strong>ry Access Control<br />

system is needed

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!