Enterprise operation and maintenance job interview: Linux server how to prevent the Trojan?

Source: Internet
Author: User
Keywords Enterprise Security Linux Server Enterprise Operation and Maintenance
Tags business code control directory enterprise enterprise operation enterprise operation and maintenance enterprise security

Enterprise operation and maintenance job interview: Linux server how to prevent the Trojan?

(A) to answer the strategy to business interview is a number of competitors, so pay attention to the dimensions and height of the answer, we must immediately spike competitors, get high-paying offer.

(B) answer tactics

Because Linux Trojans are often malicious people through the Web's upload directory to upload Trojans to the Linux server, according to the malicious Web site to start from -> Linux -> HTTP Services -> middleware services - > Program code -> DB -> storage, layer card set protection.

(C) from the perspective of user access to answer the reference

1, the development process code to upload file type restrictions, for example, can not upload. Php program (JS and backend code control).

2, the contents of the upload (including text and files) testing, testing methods can be through the program, Web services layer (middleware layer), database level control.

3, control the upload directory permissions and non-site directory permissions (Linux file directory permissions + Web service layer control).

4, pass the Trojan file access and execution control (Web service layer + file system storage layer).

5, on the important configuration files, commands and WEB configuration files to do md5 fingerprint and backup.

6, install antivirus software such as clamav, regular monitoring killing Trojans.

7, configure the server firewall and intrusion detection services.

8, monitoring server file changes, process changes, port changes, important security log and timely alarm.

(D) from the internal management point of view: to prevent being lifted

1, vpn management server or web management server.

2, ssh monitoring network.

3, the use of springboard, operational audit.

4, sudo centralized management, lock the key files.

5, site directory, upload directory permissions belong to group control.

6, do system and site file backup fingerprint monitoring alarm.

7, dynamic password authentication.

(E) the best users to answer

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.