SlideShare a Scribd company logo
1 of 17
D H A B I A H B A D E R 1 0 A G
Lunix principles and
philosophy
Know your system(s)
The first principle is about knowing what your system
is supposed to do. What is its primary role, what
software packages does it need and who needs
access?
By knowing the role of the system you can better
defend it against known and unknown threats.
Security Measures:
Password policy
Proper software patch management
Configuration management
Documentation
Least Amount of Privilege
Each process running, or package installed,
might become a target. Security professionals
call this the “attack surface”. What you want is
to minimize this attack surface by removing
unneeded components, limit access and by
default use a “deny unless” strategy. This
latter means that access by default is
blocked, unless you allow it (whitelisting).
Security Measures:
Use minimal/basic installation
Only allow access to people who really need
it
Perform Defense in Depth
Protect the system by applying several layers
of security. This principle is named “defense in
depth” and can be compared with an onion: to
get to the core, you have to peel of layer by
layer. One broken defense might help us
protect against full compromise.
Security Measures:
IPtables / Nftables
Hardening of software components
Know your Enemy
You can only protect a system the right
way, if you know what threats you are
facing. Why would this system be a target
and who would be targeting it? Perform a
risk analysis and determine what potential
threats your system might endure.
Security Measures:
Vulnerability scans
Penetration tests
Risk analysis
Protection is Key, Detection is a Must
Security focuses on the protection of assets. While
this is a primary objective, we should consider that
one day our defenses are broken. Therefore we
want to know this as soon as possible, so we can
properly act. This is where principle 3 and 4 both
are linked. Set-up proper detection methods,
similar to the trip wires used by the military.
Security Measures:
Linux audit framework
Remote Logging
Create backups and test them
Source code availability The author must make
source code available and permit redistribution of
both source code and (if applicable) binary code.
Permission to derive works The license must permit
others to modify the soft- ware and to distribute such
modifications under the same license as the original.
Respect for source code integrity The license may
restrict redistribution of modified source code, but
only if patch files may be distributed along with the
original source code. The license may require that
derived works change the soft- ware’s name or
version number.
No discrimination against persons or groups The
license must not discrimi- nate against any person
or group of people.
No discrimination against fields of endeavor The
license must not forbid use of the program in any
field, such as in business or by genetics
researchers.
Automatic license distribution The license must
apply to anybody who receives the program
without needing a separate agreement.
Lack of product specificity The license must not
require that the program be used or distributed as
part of a larger program—that is, you may extract a
single program from a larger collection and
redistribute it alone.
Lack of restrictions on other software The license
must not impose restric- tions on other software
that’s distributed along with the licensed software.
Technology neutrality The license
must not be restricted based on
specific technologies or interfaces.
Understanding the Open Source Philosopy
The FSF’s advocacy efforts were (and are) based on a strong moral
imperative— software should be free, in the FSF’s view, with “free” defined
as described earlier. This approach appeals to some people, but others—
particularly businesses that want to make money off of software—find this
type of advocacy strange at best and threatening at worst.
For these reasons, the OSI’s creators designed
their organization as a way to advocate free
software. By using a new term—open source—and
by softening some of the FSF’s moral imperatives,
the OSI aims to promote open source soft- ware in
the business world. The difference in tone from the
FSF’s moral impera- tive can be seen in the
opening statement on the OSI’s Web site
(http://www​ .opensource.org):
he FSF advocates what it calls free software, which it defines
in terms of freedom to do things you want to do with the
software, not the price of the software. A common phrase to
make this distinction clear is “free as in speech, not free as in
beer.” The FSF defines four specific software freedoms:
IIFreedom to use the software for any purpose
IIFreedom to examine the source code and modify it as you
see fit IIFreedom to redistribute the software
IIFreedom to redistribute your modified software
These freedoms are similar to the principles
espoused by the OSI, described shortly;
however, there are some important
differences in interpretation, also as
described shortly. The FSF elaborates on the
implications of each of its principles, and their
interactions, at
http://www.gnu.org/philosophy/free-sw.html.
In an ideal world, by the FSF’s standards, all software
would be free—distributed with source code and all the
freedoms just outlined. Some Linux distributions meet
this ideal in isolation; however, some distributions
include proprietary soft- ware. Sometimes this software
is freeware, but other times it’s a bit of proprietary code
that enables the vendor to restrict redistribution and
charge money to sell the software. Since free software
is not necessarily free of charge, selling it is not a
problem from the FSF’s point of view, but given the
other freedoms, free software’s price tends toward zero
as it gets passed around
Nine major tenets
There are nine major tenets to the Linux philosophy.
Small is Beautiful
Each Program Does One Thing Well
Prototype as Soon as Possible
Choose Portability Over Efficiency
Store Data in Flat Text Files
Use Software Leverage
Use Shell Scripts to Increase Leverage and
Portability
Avoid Captive User Interfaces
Make Every Program a Filter
There are also 10 lesser tenets and some
corollaries to the Linux philosophy that are also
important. I will cover some of those in future
articles.

More Related Content

Viewers also liked

Ruch i jego śledzenie czyli wdrożenie strategii SEO oraz analityki
Ruch i jego śledzenie czyli wdrożenie strategii SEO oraz analityki Ruch i jego śledzenie czyli wdrożenie strategii SEO oraz analityki
Ruch i jego śledzenie czyli wdrożenie strategii SEO oraz analityki Bluerank
 
What's new in IBM Informix 12.1?
What's new in IBM Informix 12.1?What's new in IBM Informix 12.1?
What's new in IBM Informix 12.1?Keshav Murthy
 
Way to win in KZ
Way to win in KZWay to win in KZ
Way to win in KZTele2
 
Presentation on road network 1
Presentation on road network 1 Presentation on road network 1
Presentation on road network 1 LAWAL SANI
 
German Telecoms Market Q2/2016
German Telecoms Market Q2/2016German Telecoms Market Q2/2016
German Telecoms Market Q2/2016DSP-Partners
 
KBI Case Studies: Process Development
KBI Case Studies: Process DevelopmentKBI Case Studies: Process Development
KBI Case Studies: Process DevelopmentKBI Biopharma
 
What's New in Oracle EPM Cloud
What's New in Oracle EPM CloudWhat's New in Oracle EPM Cloud
What's New in Oracle EPM CloudPerficient, Inc.
 
Innovation Mindset Inspirational & Motivational Quotes
Innovation Mindset Inspirational & Motivational Quotes Innovation Mindset Inspirational & Motivational Quotes
Innovation Mindset Inspirational & Motivational Quotes Darin Eich, Ph.D.
 
A review of innovative rural road
A review of innovative rural roadA review of innovative rural road
A review of innovative rural roadEr Deepak Tiwari
 
How to Keep Your Staff Happy
How to Keep Your Staff HappyHow to Keep Your Staff Happy
How to Keep Your Staff HappyBrightCarbon
 
Road safety presentation(PPT) by Faisal
Road safety presentation(PPT) by FaisalRoad safety presentation(PPT) by Faisal
Road safety presentation(PPT) by FaisalFaisal Ayub
 
Purified Water System in Pharmaceuticals
Purified Water System in PharmaceuticalsPurified Water System in Pharmaceuticals
Purified Water System in PharmaceuticalsPharmaguideline
 

Viewers also liked (18)

Ruch i jego śledzenie czyli wdrożenie strategii SEO oraz analityki
Ruch i jego śledzenie czyli wdrożenie strategii SEO oraz analityki Ruch i jego śledzenie czyli wdrożenie strategii SEO oraz analityki
Ruch i jego śledzenie czyli wdrożenie strategii SEO oraz analityki
 
Nuestro hábitat de crecimiento
Nuestro hábitat de crecimientoNuestro hábitat de crecimiento
Nuestro hábitat de crecimiento
 
Venciendo el apego
Venciendo el apegoVenciendo el apego
Venciendo el apego
 
What's new in IBM Informix 12.1?
What's new in IBM Informix 12.1?What's new in IBM Informix 12.1?
What's new in IBM Informix 12.1?
 
Los hemisferios cerebrales
Los hemisferios cerebralesLos hemisferios cerebrales
Los hemisferios cerebrales
 
Way to win in KZ
Way to win in KZWay to win in KZ
Way to win in KZ
 
Presentation on road network 1
Presentation on road network 1 Presentation on road network 1
Presentation on road network 1
 
German Telecoms Market Q2/2016
German Telecoms Market Q2/2016German Telecoms Market Q2/2016
German Telecoms Market Q2/2016
 
Review of road network
Review of road networkReview of road network
Review of road network
 
Landuse Mapping
Landuse Mapping Landuse Mapping
Landuse Mapping
 
KBI Case Studies: Process Development
KBI Case Studies: Process DevelopmentKBI Case Studies: Process Development
KBI Case Studies: Process Development
 
What's New in Oracle EPM Cloud
What's New in Oracle EPM CloudWhat's New in Oracle EPM Cloud
What's New in Oracle EPM Cloud
 
Innovation Mindset Inspirational & Motivational Quotes
Innovation Mindset Inspirational & Motivational Quotes Innovation Mindset Inspirational & Motivational Quotes
Innovation Mindset Inspirational & Motivational Quotes
 
A review of innovative rural road
A review of innovative rural roadA review of innovative rural road
A review of innovative rural road
 
How to Keep Your Staff Happy
How to Keep Your Staff HappyHow to Keep Your Staff Happy
How to Keep Your Staff Happy
 
Road safety presentation(PPT) by Faisal
Road safety presentation(PPT) by FaisalRoad safety presentation(PPT) by Faisal
Road safety presentation(PPT) by Faisal
 
Purified Water System in Pharmaceuticals
Purified Water System in PharmaceuticalsPurified Water System in Pharmaceuticals
Purified Water System in Pharmaceuticals
 
Geotextiles
Geotextiles Geotextiles
Geotextiles
 

Similar to Lunix xx

Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsBinary Semantics
 
Open source technology
Open source technologyOpen source technology
Open source technologyRohit Kumar
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary softwareLavan1997
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GISJoanne Cook
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Sonatype
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresAntara Rastogi
 
Open Source and You
Open Source and YouOpen Source and You
Open Source and YouJeff Stoner
 
Free and Open Source Software for Business: An Introduction
Free and Open Source Software for Business: An IntroductionFree and Open Source Software for Business: An Introduction
Free and Open Source Software for Business: An IntroductionJames Kariuki
 
DBMS and comparing open-source and NON open-source platforms
DBMS and comparing open-source and NON open-source platforms DBMS and comparing open-source and NON open-source platforms
DBMS and comparing open-source and NON open-source platforms HamaQarani
 
WP_Open-Source_Best_pratice_web
WP_Open-Source_Best_pratice_webWP_Open-Source_Best_pratice_web
WP_Open-Source_Best_pratice_webPaul Plaquette
 
Introduction To Open Source Licenses
Introduction To Open Source LicensesIntroduction To Open Source Licenses
Introduction To Open Source LicensesHarley Pascua
 

Similar to Lunix xx (20)

Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary Semantics
 
Coursework
CourseworkCoursework
Coursework
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
1 Open Source Business
1 Open Source Business1 Open Source Business
1 Open Source Business
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary software
 
Open Source VP.pptx
Open Source VP.pptxOpen Source VP.pptx
Open Source VP.pptx
 
The Business Case for Open Source GIS
The Business Case for Open Source GISThe Business Case for Open Source GIS
The Business Case for Open Source GIS
 
Foss introduction and history
Foss introduction and historyFoss introduction and history
Foss introduction and history
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
Open Source and You
Open Source and YouOpen Source and You
Open Source and You
 
Discuss open sourcelicensing
Discuss open sourcelicensingDiscuss open sourcelicensing
Discuss open sourcelicensing
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Fosss
FosssFosss
Fosss
 
Free and Open Source Software for Business: An Introduction
Free and Open Source Software for Business: An IntroductionFree and Open Source Software for Business: An Introduction
Free and Open Source Software for Business: An Introduction
 
DBMS and comparing open-source and NON open-source platforms
DBMS and comparing open-source and NON open-source platforms DBMS and comparing open-source and NON open-source platforms
DBMS and comparing open-source and NON open-source platforms
 
WP_Open-Source_Best_pratice_web
WP_Open-Source_Best_pratice_webWP_Open-Source_Best_pratice_web
WP_Open-Source_Best_pratice_web
 
Open source
Open sourceOpen source
Open source
 
Introduction To Open Source Licenses
Introduction To Open Source LicensesIntroduction To Open Source Licenses
Introduction To Open Source Licenses
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Lunix xx

  • 1. D H A B I A H B A D E R 1 0 A G Lunix principles and philosophy
  • 2. Know your system(s) The first principle is about knowing what your system is supposed to do. What is its primary role, what software packages does it need and who needs access? By knowing the role of the system you can better defend it against known and unknown threats. Security Measures: Password policy Proper software patch management Configuration management Documentation
  • 3. Least Amount of Privilege Each process running, or package installed, might become a target. Security professionals call this the “attack surface”. What you want is to minimize this attack surface by removing unneeded components, limit access and by default use a “deny unless” strategy. This latter means that access by default is blocked, unless you allow it (whitelisting). Security Measures: Use minimal/basic installation Only allow access to people who really need it
  • 4. Perform Defense in Depth Protect the system by applying several layers of security. This principle is named “defense in depth” and can be compared with an onion: to get to the core, you have to peel of layer by layer. One broken defense might help us protect against full compromise. Security Measures: IPtables / Nftables Hardening of software components
  • 5. Know your Enemy You can only protect a system the right way, if you know what threats you are facing. Why would this system be a target and who would be targeting it? Perform a risk analysis and determine what potential threats your system might endure. Security Measures: Vulnerability scans Penetration tests Risk analysis
  • 6. Protection is Key, Detection is a Must Security focuses on the protection of assets. While this is a primary objective, we should consider that one day our defenses are broken. Therefore we want to know this as soon as possible, so we can properly act. This is where principle 3 and 4 both are linked. Set-up proper detection methods, similar to the trip wires used by the military. Security Measures: Linux audit framework Remote Logging Create backups and test them
  • 7. Source code availability The author must make source code available and permit redistribution of both source code and (if applicable) binary code. Permission to derive works The license must permit others to modify the soft- ware and to distribute such modifications under the same license as the original.
  • 8. Respect for source code integrity The license may restrict redistribution of modified source code, but only if patch files may be distributed along with the original source code. The license may require that derived works change the soft- ware’s name or version number. No discrimination against persons or groups The license must not discrimi- nate against any person or group of people.
  • 9. No discrimination against fields of endeavor The license must not forbid use of the program in any field, such as in business or by genetics researchers. Automatic license distribution The license must apply to anybody who receives the program without needing a separate agreement.
  • 10. Lack of product specificity The license must not require that the program be used or distributed as part of a larger program—that is, you may extract a single program from a larger collection and redistribute it alone. Lack of restrictions on other software The license must not impose restric- tions on other software that’s distributed along with the licensed software.
  • 11. Technology neutrality The license must not be restricted based on specific technologies or interfaces.
  • 12. Understanding the Open Source Philosopy The FSF’s advocacy efforts were (and are) based on a strong moral imperative— software should be free, in the FSF’s view, with “free” defined as described earlier. This approach appeals to some people, but others— particularly businesses that want to make money off of software—find this type of advocacy strange at best and threatening at worst.
  • 13. For these reasons, the OSI’s creators designed their organization as a way to advocate free software. By using a new term—open source—and by softening some of the FSF’s moral imperatives, the OSI aims to promote open source soft- ware in the business world. The difference in tone from the FSF’s moral impera- tive can be seen in the opening statement on the OSI’s Web site (http://www​ .opensource.org):
  • 14. he FSF advocates what it calls free software, which it defines in terms of freedom to do things you want to do with the software, not the price of the software. A common phrase to make this distinction clear is “free as in speech, not free as in beer.” The FSF defines four specific software freedoms: IIFreedom to use the software for any purpose IIFreedom to examine the source code and modify it as you see fit IIFreedom to redistribute the software IIFreedom to redistribute your modified software
  • 15. These freedoms are similar to the principles espoused by the OSI, described shortly; however, there are some important differences in interpretation, also as described shortly. The FSF elaborates on the implications of each of its principles, and their interactions, at http://www.gnu.org/philosophy/free-sw.html.
  • 16. In an ideal world, by the FSF’s standards, all software would be free—distributed with source code and all the freedoms just outlined. Some Linux distributions meet this ideal in isolation; however, some distributions include proprietary soft- ware. Sometimes this software is freeware, but other times it’s a bit of proprietary code that enables the vendor to restrict redistribution and charge money to sell the software. Since free software is not necessarily free of charge, selling it is not a problem from the FSF’s point of view, but given the other freedoms, free software’s price tends toward zero as it gets passed around
  • 17. Nine major tenets There are nine major tenets to the Linux philosophy. Small is Beautiful Each Program Does One Thing Well Prototype as Soon as Possible Choose Portability Over Efficiency Store Data in Flat Text Files Use Software Leverage Use Shell Scripts to Increase Leverage and Portability Avoid Captive User Interfaces Make Every Program a Filter There are also 10 lesser tenets and some corollaries to the Linux philosophy that are also important. I will cover some of those in future articles.