To achieve Linux security, there is no powerful sword

Source: Internet
Author: User
To achieve Linux security, there is no powerful sword-general Linux technology-Linux technology and application information. The following is a detailed description. For IT administrators, integrating Linux with legacy systems and implementing a secure IT system are two of the biggest challenges, and they complain about Linux in general, as Peter Harrison said. Peter Harrison is an IT professional in many fields and has just written a new book Linux Quick Fix Notebook published by Prentice Hall. In this technical article, Harrison does not provide a fast patching method, but provides wise advice on security and integration.

In terms of installation, there is no sword. Threats are dynamic, and technologies are constantly changing. Security using system methods usually requires careful consideration.

In my opinion, the recommendations made by regular security audits and mandatory audits are the most important security tools. Software usually requires patching, And the password also needs to be changed from time to time. Only the predefined servers can communicate with each other using specific protocols. Unauthorized wireless network Access points (AP, Access Point) must be found. users' Access and control needs to be periodically evaluated. Emails must be scanned for intrusion and password theft detection. The system must be monitored to prevent security risks.

Many organizations believe that security only prevents unauthorized data access. However, security intelligence should include Intrusion Prevention for everything and any data access threats. This requires audit of multiple aspects, including power supplies, waveguide equipment and cooling systems in buildings, data backup for off-site storage, network redundancy, and maintenance of physical security systems, such as cameras and physical access records.

"Fix" implies that a piece of time is damaged, which means that a system has been damaged. The security administrator must take preventive measures to minimize the number of patches.

Integration problems

As more and more organizations accept Linux, the next step for IT administrators is to study how Linux-based applications can be integrated with existing systems and applied in future projects.

Itadministrators say that seamless Linux addition will enhance vendor independence. This will lead to a large scale of competition between IT providers and providers that may offer more favorable purchase conditions to IT managers. solutions that meet business needs will emerge on a large scale. They realized that the introduction of Linux would bring new opportunities in personnel training, project management and system integration, and felt that the cost and operational flexibility advantages it brought would make it worthwhile.

That is to say, IT administrators think Windows is not an hour, but integrating it with Linux is an important issue. For example, a manager once complained to me that the biggest problem was: "I just installed Linux on my server. It is relatively easy, but how can I integrate it with my existing Windows system?"

Integrating Linux with other systems usually requires a pilot project to help us discover possible problems in this task. Based on the predefined goals, you may need to build a small team that contains various disciplines, start a conceptual and theoretical experiment, and then use some devices in the existing system for large-scale testing. With the increase in trust in Linux, full-scale integration is achieved.

In the above scenario, Linux should be treated as a new technology. Compatibility, bearer capacity, implementation and purchase costs, time, and feasibility of reaching the predefined goals all need to be considered.

Linux is a feasible IT alternative. All new server projects should carefully consider whether to choose Linux. Integrating Linux with new or old copyrighted systems will become a very common and necessary IT skill.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.