Enterprise operation and maintenance job interview: Linux server how to prevent the Trojan?
(A) to answer the strategy to business interview is a number of competitors, so pay attention to the dimensions and height of the answer, we must immediately spike competitors, get high-paying offer.
(B) answer tactics
Because Linux Trojans are often malicious people through the Web's upload directory to upload Trojans to the Linux server, according to the malicious Web site to start from -> Linux -> HTTP Services -> middleware services - > Program code -> DB -> storage, layer card set protection.
(C) from the perspective of user access to answer the reference
1, the development process code to upload file type restrictions, for example, can not upload. Php program (JS and backend code control).
2, the contents of the upload (including text and files) testing, testing methods can be through the program, Web services layer (middleware layer), database level control.
3, control the upload directory permissions and non-site directory permissions (Linux file directory permissions + Web service layer control).
4, pass the Trojan file access and execution control (Web service layer + file system storage layer).
5, on the important configuration files, commands and WEB configuration files to do md5 fingerprint and backup.
6, install antivirus software such as clamav, regular monitoring killing Trojans.
7, configure the server firewall and intrusion detection services.
8, monitoring server file changes, process changes, port changes, important security log and timely alarm.
(D) from the internal management point of view: to prevent being lifted
1, vpn management server or web management server.
2, ssh monitoring network.
3, the use of springboard, operational audit.
4, sudo centralized management, lock the key files.
5, site directory, upload directory permissions belong to group control.
6, do system and site file backup fingerprint monitoring alarm.
7, dynamic password authentication.
(E) the best users to answer