Book Image

Learning Embedded Linux Using the Yocto Project

By : Alexandru Vaduva, Vaduva Jan Alexandru
Book Image

Learning Embedded Linux Using the Yocto Project

By: Alexandru Vaduva, Vaduva Jan Alexandru

Overview of this book

Table of Contents (20 chapters)
Learning Embedded Linux Using the Yocto Project
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
8
Hob, Toaster, and Autobuilder
9
Wic and Other Tools
Index

Chapter 11. Security

In this chapter, you will be presented with various security enhancements tools. Our first stop is the Linux kernel and here, there are two tools, SELinux and grsecurity, both of which are really interesting as well as necessary. Next, the Yocto Project's security-specific layers will also be explained. These include the meta-security and meta-selinux that contain an impressive number of tools and can be used to secure or audit various components of the Linux system. Since this subject is vast, I will also let you inspect various other solutions, both implemented in the Linux kernel but also externally. I hope you enjoy this chapter and that you find this information interesting and useful.

In any operating system, security is a really important concern both for the users and developers. It did not pass much time and developers have started to address these security problems in various methods. This resulted in a number of security methodologies and improvements for available...