One of the most appealing features of Linux systems are the security features it possesses. Go online and see if you can find any instance of a Linux-based system being hacked or otherwise compromised. If you can find one, explain how the security features were circumvented.