How to maintain server security

Source: Internet
Author: User
Keywords server
Tags access backup check data default enterprise enterprises hacked

Server security is crucial to the enterprise. In recent years, servers have been at increased risk of "black hands." Recently, news of servers and viruses has been heard and hacked. First of all, these malicious attacks are designed to consume server resources, affect the normal operation of the server, and even attack the network where the server is paralyzed. On the other hand, they are acts of aggression, which are mostly related to certain interests. Some involve sensitive information of enterprises, and some of them are peers.

No matter what, we have to protect the security of the server, now by the well-known overseas server provider China Connaught Network engineers tell us some tips to maintain server security:

First, do a good job of hardware maintenance

As more data is being processed and more resources are used, the server needs more memory and hard disk capacity to store the resources. Therefore, servers need to be upgraded after some time, but additional memory or hard disk needs to be added When to consider compatibility, stability, or different types of memory may cause system error.

When uninstalling or replacing the device, you need to read the manual carefully and do not disassemble it. You must perform the operation after the power is completely turned off and the server is properly grounded to prevent the device from being damaged by static electricity.

Similarly, the server's biggest killer dust, so need to regularly dust the server. Pay particular attention to the power dust removal.

Second, do a good job of data backup

For businesses, the data on the server is invaluable, and the loss is huge if the database is lost, so businesses need to make regular backups of the data just in case. The average enterprise needs a daily backup of the data on the server, but also to put the backup data on different servers,

Data needs to be backed up, also need anti-theft. You can password protect the tape and you can encrypt the data if your backup program supports encryption. At the same time, to set a good backup time, usually the backup process will choose to be carried out after 10 o'clock in the evening to the end.

Third, regularly check the network

Site inspection is also an important step to check the network code is whether the hacker placed a page Trojan and ASP Trojans, whether there is a backdoor in the site code, whether there is a SQL injection vulnerability, upload file vulnerabilities and other common hazards Site Security Vulnerability. Analysis of the server operating system logs to check whether the system has been compromised to see whether the hackers installed Trojans and made changes to the system.

Fourth, turn off unnecessary services, only the open port

For starters, it is recommended to use Windows 2000 on all workstations. Windows 2000 is a very safe operating system. If you do not want to do this, then at least use Windows NT. You can lock your workstations, making it harder or impossible for some people without secure access to get network configuration information.

Or shut down those unnecessary services, local management and group management. There are many default Windows services do not actually need to open, and can even be said to be dangerous, such as: the default shared Remote Registry Service (Remote Registry Service), the system is sensitive to many of the information written in the registry, such as pcanywhere encryption password.

Close those unnecessary ports. Some seemingly unnecessary ports, indeed, can reveal many sensitive information to the operating system, such as windows 2000 server, the default open IIS service to tell each other your operating system is windows 2000.69 port to tell your operating system is very hacker May be linux or unix system, because 69 is the default tftp service port used by these operating systems. Further access to the port can also return some information about the software on the server and its version, all of which can be of great help in hacking. In addition, open ports are more likely to become hackers access to the server portal.

The above is a few tips on the safe operation of the daily operation of the server. To ensure corporate information security, to prevent the loss of sensitive information on the server, CNN hopes these suggestions can help those in need.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.