Analysis of Three entry points of Enterprise Server Security Protection

Source: Internet
Author: User
Tags password protection

As a network engineer, ensuring the security of enterprise servers and normal operation is the primary issue in network management. So how can we effectively protect the security of servers? Based on my work experience over the past decade, I have established a protection system from the following three points:

Entry Point 1: Establish a strong network security system

To isolate an enterprise's servers and "Protect" them one by one, as the core component of the network, it should be integrated with other devices around it for overall planning and arrangement, in order to comprehensively solve security problems and better ensure server security.

Therefore, we must establish an overall, comprehensive, and powerful computer network security system. Only by developing and implementing a unified security system for the entire network can we effectively protect the servers and other components involved in the network. At the same time, every employee in the company should be aware of this security system and be aware that it is enforced.

A complete security system consists of two parts: security management and security technology. From the management point of view, security management regulates and limits various computer network behaviors in written forms such as rules and regulations, such as operating specifications of various network devices. Security Technology, as its name suggests, is a technical point of view, use various software (such as anti-virus software and firewall software) and hardware (such as hardware firewall), various techniques and methods to manage the entire computer network.

Specific to the server, on the one hand, it is necessary to strictly regulate operations on the server, prohibit all behaviors that may be harmful to the server and its data, especially for "write" and "delete; strengthen Management of the Central Data Center and prohibit anyone other than network management personnel from operating the server at will. On the other hand, medicines use existing security technologies as much as possible to ensure server security. For example, you can use the "User Permissions" function provided by windows 2000/2003 Sever to separately grant special server access permissions to each staff member based on their business characteristics, this avoids security risks caused by the use of unified server access permissions.

Entry Point 2: Establish necessary protection Basics

The vulnerability causes security problems. Each attack on the network begins with a security vulnerability. Therefore, to ensure the security of servers, you must establish the necessary protection basis and try to use existing security technologies (such as the System File Format and operating system) to build servers until the entire computer network. This fundamentally ensures the security of the server.

For example, for illegal intruders (including all unauthorized visitors, including hackers), disk data stored in the FAT format is easier to access and damage than in the NTFS format. Therefore, it is unsafe for a server to set its disk partition to the FAT format. Start from the basics and try to convert all the disk partitions on the server to the NTFS format, especially the disk partitions with sensitive data.

As an enterprise, it is not a problem to purchase an authentic network monitoring software to continuously monitor the entire network, in particular, real-time monitoring reports on "illegal intrusion" and "server operations" can promptly notify network maintenance personnel to respond quickly and minimize losses. At the same time, to address the increasing number of Trojans and viruses, it is essential for enterprises to spend money to buy anti-virus software for online versions.

Entry 3: regularly back up data

If the previous work is done well, there may be more or less losses, but natural disasters and man-made disasters are inevitable. In order to avoid them as much as possible, we also need to use existing technologies to regularly back up data (such as enterprise ERP data to record the daily business data of the company) and properly store the data, which must be completed by network administrators in daily management, it is also a good work habit that must be developed by excellent network administrators.

Is data backed up safe? Theft also exists. Therefore, when backing up data, you should consider locking in the safe and "password protection" to protect your backup media (such as disks and tapes) for the second and third times ). It is best to encrypt and process enterprise data synchronously during backup. In this way, the data will not be decrypted even if it is stolen.

  1. Brief Introduction to knowledge about Linux Server hacking
  2. Seven Elements for troubleshooting Linux server access faults
  3. The most important aspect of security in the Information Age: server hard defense

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.