Security-Focused Operating System

From Handwiki

Short description: Operating systems focused on security


This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.

Linux

Main page: Software:Linux

Android-based

Main page: Software:Android (operating system)
  • CalyxOS is designed for privacy, security, and accessibility.[1]
  • DivestOS is a fork of LineageOS that aims to increase privacy and security.
  • GrapheneOS is a privacy and security-focused mobile operating system for selected Google Pixel smartphones and tablets.
  • Kali NetHunter is a mobile penetration testing platform based on Kali Linux.[2]

Arch-based

Main page: Software:Arch Linux
  • BlackArch is a penetration testing distribution that provides a large number of security tools.

Debian-based

Main page: Software:Debian
  • Kali Linux is designed for digital forensics and penetration testing.[3]
  • Parrot OS Security Edition is designed for penetration testing, vulnerability assessment and mitigation, computer forensics, and anonymous web browsing.[4]
  • Tails is aimed at preserving privacy and anonymity.[5]
  • Whonix consists of two virtual machines. All communications are forced through Tor.[6][7][8]

Gentoo-based

Main page: Software:Gentoo Linux
  • Pentoo is a Live CD and Live USB designed for penetration testing and security assessment.[9][10][11][12]

Other Linux distributions

  • Alpine Linux is designed to be small, simple, and secure.[13] It uses musl, BusyBox, and OpenRC instead of the more commonly used glibc, GNU Core Utilities, and systemd.[14]
  • Fedora Silverblue is an immutable desktop operating system. Every Silverblue installation is identical to every other installation of the same version, and it never changes as it is used.[15]

BSD

Main page: Software:Berkeley Software Distribution
  • OpenBSD is a Unix-like operating system that emphasizes portability, standardization, correctness, proactive security, and integrated cryptography.[16]

Xen

Main page: Software:Xen
  • Qubes OS aims to provide security through isolation.[17] Isolation is provided through the use of virtualization technology. This allows the segmentation of applications into secure virtual machines.

See also

References

  1. "About The Calyx Institute - Calyx Institute". https://calyxinstitute.org/about. 
  2. "Kali NetHunter Documentation". https://www.kali.org/docs/nethunter/. 
    • "Kali Linux 1.0 review". 2013-03-14. http://linuxbsdos.com/2013/03/14/kali-linux-1-0-review/. 
    • Simionato, Lorenzo (2007-04-24). "Review: BackTrack 2 security live CD". https://www.linux.com/news/review-backtrack-2-security-live-cd. 
    • Barr, Joe (13 June 2008). "Test your environment's security with BackTrack". https://www.linux.com/news/test-your-environments-security-backtrack. 
    • "BackTrack 4 - Hacking galore". 2009-05-15. https://www.dedoimedo.com/computers/backtrack.html. 
    • "BackTrack 5 R3 review". 2012-08-17. http://linuxbsdos.com/2012/08/17/backtrack-5-r3-review/. 
  3. "Parrot Security Could Be Your Next Security Tool" (in en). 2 December 2016. https://www.linux.com/learn/security/parrot-security-could-be-your-next-security-tool. 
  4. Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net"]. https://lwn.net/Articles/440279/. 
  5. "Devs cook up 'leakproof' all-Tor untrackable platform". The Register. 13 Nov 2012. https://www.theregister.co.uk/2012/11/13/whonix/. 
  6. Greenburg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired. https://www.wired.com/2014/06/be-anonymous-online/. 
  7. "Whonix adds a layer of anonymity to your business tasks". TechRepublic. 4 January 2013. http://www.techrepublic.com/blog/smb-technologist/whonix-adds-a-layer-of-anonymity-to-your-business-tasks/. 
  8. Pentoo (Gentoo) Based Linux Review, Features and Screenshot Tour, TecMint.
  9. KITE Introduces a New Secured FOSS Based Operating System
  10. A Look at Pentoo Linux and Its Security Analysis Tools, eWeek
  11. 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
  12. "about | Alpine Linux". https://alpinelinux.org/about/. 
  13. says, GigaTux (24 August 2010). "Alpine Linux 2 review | LinuxBSDos.com". https://linuxbsdos.com/2010/08/23/alpine-linux-2-review/. 
  14. "Fedora Silverblue User Guide :: Fedora Docs". https://docs.fedoraproject.org/en-US/fedora-silverblue/. 
  15. OpenBSD Project (19 May 2020). "OpenBSD". https://www.openbsd.org/. 
  16. "Qubes OS bakes in virty system-level security". The Register. September 5, 2012. https://www.theregister.co.uk/2012/09/05/qubes_secure_os_released/. 



Retrieved from "https://handwiki.org/wiki/index.php?title=Security-focused_operating_system&oldid=3367035"

Categories: [Computer security] [Operating system security]


Download as ZWI file | Last modified: 07/30/2024 22:23:26 | 13 views
☰ Source: https://handwiki.org/wiki/Security-focused_operating_system | License: CC BY-SA 3.0

ZWI is not signed. [what is this?]