Enhance Linux servers

Source: Internet
Author: User
Tags least privilege
Article Title: Enhancing Linux servers. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.

Introduction to GNU/Linux Server Security

In terms of testing or production, servers are the main targets of attackers. By taking appropriate measures, you can convert vulnerable "Boxes" into enhanced servers and defeat attackers. In this article, you understand how to protect SSH sessions, configure firewall rules, and set intrusion detection to remind you of all possible GNU/Linux instances? Server attack. With a deep understanding of the basic knowledge of server protection, you can further enhance the system on this basis.
Before getting started

In this tutorial, you will learn the basic knowledge of protecting GNU/Linux servers and lay a solid foundation for future extension of this knowledge.

About this tutorial

This tutorial uses a basic method to protect the servers running the GNU/Linux operating system. This tutorial introduces basic security concepts and guides you through step-by-step operation examples. These examples demonstrate how to protect the confidentiality, integrity, and availability of the desktop and server environments and their data.


Target

In this tutorial, you will learn the basic concepts of security management, including how to protect Secure Shell (SSH) remote logon, create firewall rules, and view logs to discover possible attacks.

Prerequisites

This tutorial is for beginners of GNU/Linux. You should have some knowledge about operating system installation and command line. To fully understand the concepts in this tutorial, you should first learn the related tutorial "Enhancing Linux Desktop Security ".

System Requirements

To run the examples in this tutorial, you must install Ubuntu Server Edition on a computer or Virtual Machine (such as Sun VirtualBox. In addition, you need to connect to the Internet to download the specific software package used in this tutorial.


Introduction

To learn how to enhance the basic knowledge of servers running the GNU/Linux operating system, you must know that although many core security concepts apply to desktop and server operating systems, however, the protection methods are completely different.

For various reasons, protecting servers is very different from protecting desktop computers. By default, the desktop operating system is installed to provide users with an environment that can run instantly. Before the sale, the desktop operating system assumes that they require the lowest configuration and provides as many applications as possible to help users start to use and run. On the contrary, the operating system of the server should abide by the principle of least privilege, indicating that the user should only have the services, software and permissions required to execute the relevant tasks.

 Minimum privilege Principle
A truly secure network ensures that the minimum privilege principle is applied to the entire enterprise, rather than the server. The role of servers and desktops also shows how to protect operating systems and computers. Desktop is the target of attacks that attackers like. Generally, they can use updated software and malicious program scanning programs to prevent such attacks. However, the data center that carries user accounts or credit card information is a target that skilled attackers prefer to attack. They can exploit the vulnerability and cannot detect the attack in an environment that has not yet been enhanced.

[1] [2] [3] [4] [5] [6] [7] Next page

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.