How to maintain server security

Source: Internet
Author: User
Keywords Hacker attack enterprise information security

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

The security of the server is vital to the enterprise, in recent years, the server encounters "Black Hand" the risk is more and more big, on the recent server encounter virus, hacker attack News. First of all, these malicious attacks are designed to consume server resources, affect the normal operation of the server, and even attack the network paralysis of the server. On the one hand, is the invasion of behavior, which is mostly related to some interests, some of the sensitive information companies, some peer Fry.

Anyway, we have to protect the security of the server, now, by the famous Overseas Server service provider China Connaught Network engineers told us to maintain the security of the server some tips:

First, do a good job of hardware maintenance

As more data is processed and resource consumption increases, the server needs more memory and hard disk capacity to store these resources, therefore, every time after the server needs to upgrade, but need to pay attention to increase memory or hard disk, to take into account compatibility, stability, or different models of memory may cause system errors.

Also have to unload and replace the equipment, need to read the instructions carefully, do not forcibly disassemble, and must be in full power, the server grounded in a good situation, to prevent the static electricity damage to the equipment.

Again, the server's biggest killer dust, so it needs to be regularly dusted to the server. Special attention should be paid to the power supply dust.

Second, do a good job of data backup

For the enterprise, the data on the server is very valuable, if the database is lost, the loss is very large, therefore, the enterprise needs to regularly back up the data, just in case. The average enterprise needs to back up the data on the server every day and put the backup data on different servers.

Data needs to be backed up, as well as anti-theft. You can protect the tape with a password and if your backup program supports encryption, you can also encrypt the data. At the same time, to set the backup time, usually the backup process will be selected after 10 o'clock night, to the end of the night.

Third, do a regular network inspection

Web site inspection is also a very important step, the code of the network to check whether the hacker placed a Web Trojan and ASP trojan, Web site code whether there are backdoor procedures, whether there are SQL injection vulnerabilities, upload file vulnerabilities and other common hazards of site security vulnerabilities. Analyze the log of server operating system, check whether the system is hacked, see if the Trojan is installed by hackers and what changes have been made to the system.

Four, turn off unnecessary services, only open the port

For beginners, it is recommended that you use Windows 2000 on all workstations. Windows 2000 is a very secure operating system. If you don't want to do this, use Windows NT at least. You can lock the workstation, making it difficult or impossible for someone with no security access to get network configuration information.

Or shut down those unnecessary services, do local management and group management. Windows system has many default services that are not necessarily open, or even dangerous, such as: The default shared Remote registry access (Registry service), the system a lot of sensitive information is written in the registration table, such as pcanywhere encryption password.

Close those unnecessary ports. Some seemingly unnecessary ports can disclose sensitive information about many operating systems to hackers, such as the IIS services that Windows Server defaults on to tell each other that your operating system is Windows 2000. Port 69 tells the hacker that your operating system is most likely a Linux or Unix system, because 69 is the port used by the default TFTP service under these operating systems. Further access to the port can also return some information about the software and its version on the server, which provides a great help for hacking. In addition, open ports are more likely to become hackers into the server portal.

Above is the server daily operation security maintenance of some skills. To ensure the information security of the enterprise, in case the sensitive information on the server is lost, China Connaught Network hopes to put forward these suggestions, can help the enterprises in need.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.