As the F version, CPU modules can be replaced at any time with a newer model. From the G version, the CPU module is based on open source OS Embedded Linux. The first available devices with these CPU modules are the IPLOG-GAMA controllers. They will then be used in a brand new series of G Series switches. We plan to produce them in concurrence with the F series.
Security CPU Module Version G with OS Linux
The following paragraphs summarize the most important reasons that have led us to move to the Embedded Linux open source platform.
Quick and Easy Bug Fixes
About open source software, including Linux, there are many myths casting doubt on its security. Linux is certainly not any worse than other non-public operating systems. In fact, it is the opposite. The very essence of the open source community contributes to the continuous improvement of the security of the software that is being developed. Source codes can be viewed by anyone involved in improvement of them. Secrecy of source codes does not prevent attackers from looking for their security weaknesses and abusing them. However, the number of bug fixes are limited to workers in one company. These different approaches lead in practice to the fact that, thanks to a large number of open source software developers, the probability of finding an existing error increases and its repair time is shortened. The speed of the patch is crucial from a safety point of view - the shorter the time between finding the bug and developing the repair, the less risk of misuse.
Openness is an Advantage
Publicly accessible codes are more difficult to be infected by a back doors because the code is constantly under public control. Producers of paid software, however, do not publish the source codes and therefore it is much easier for them to insert a back door. Discovering them is very difficult.
The alone concept security can not be understood as something static, which will be solved once and it is not necessary to deal with further. This is a continual process. Always before deploying new technology, a security risk analysis must be performed. On this basis, it is necessary to choose security measures to guarantee the required level of security. Only then can the new technology be utilized. During the validity of security measures, it is also necessary to continually check their application. Never to delegate security measures and the implemenation and control of them to one person. The environment of computer networks is constantly evolving and threats are changing. Therefore, the Potential Risk Analysis process and the set actions need to be continually updated.
Security is always a compromise, and the concept of "Absolute Security" is only fiction. In every assured system, there will always be some, if only a very small risk. It is always important to find a reasonable level of security that is sustainable for the long term. The amount of funds spent should correspond to the existing risks.
In Windows systems, executable is a file extension. In Linux, you must first assign a file the right to run, which clearly helps prevent unwanted malicious codes from running.
Linux systems are so diverse (there are about 200 distributions) that it is very inefficient to deal with the development of malware for Linux. In addition, distributions have a very short development cycle of around 6 months. Significantly, more economic sense makes hackers develop malicious codes for Windows, which is a globally very homogeneous software.