PRACTICAL STUDY OF CYBER PROTECTION SOFTWARE IN THE MANJARO OPERATING SYSTEM

N.A. Khrystynets

Èlektron. model. 2022, 44(4):55-63

https://doi.org/10.15407/emodel.44.04.055

ABSTRACT

Effective data protection in operating systems involves a set of controls in the form of software applications, as well the methods determine the importance of different data sets and use the most appropriate security controls. Data and file security is not the only way to protect against unauthorized access to system software. However, data security is one of the many important methods for assessing threats and reducing the risks associated with storing and processing such data. The paper identifies ways to protect the network of Linux-like operating systems in the distribution Manjaro (Ornara). Ways to configure the iptables firewall are suggested. The possibilities of backup are considered and different methods of backup of the system are used: by the software method and by means of the Deja Dup utility.

KEYWORDS

Arch Linux, Manjaro, information security, network attacks, firewall, backup.

REFERENCES

  1. Khrystynets, N.A. and Skupeiko, D.S. (2020), “Features of designing microkernel components of the operating system using GCC, GNU Binary Utilities in composition with Assembler and C languages”, Kompyuterno-intehrovani tekhnolohiyi: osvita, nauka, vyrobnytstvo, Vol. 39, pp. 208-212.
    https://doi.org/10.36910/6775-2524-0560-2020-39-34
  2. Prakash, A. (2022), How to Install Arch Linux, available at: https://itsfoss.com/install-arch-linux/.
  3. Using gufw and ufw to Configure an Ubuntu 20.04 Firewall (2020), Аnswertopia, available at: https://www.answertopia.com/ubuntu/using-gufw-and-ufw-to-configure-an-ubuntu-firewall.
  4. Müller, P., Landauer, B., Grinev, A., et al. (2021), Operating system for everyone, available at: https://manjaro.org/.
  5. Nemeth, E., Snyder, G., Hein, T., et al. (2017), UNIX and Linux System Administration Handbook.

Full text: PDF