Convergence IT Services Pvt. Ltd

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
System Security Scanning and Discovery Chapter 14.
Linux’ Security Haifa Linux Club Orr Dunkelman.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Securing LAMP: Linux, Apache, MySQL and PHP Track 2 Workshop PacNOG 7 July 1, 2010 Pago Pago, American Samoa.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
April WebEx Intel ® Active Management Technology (AMT) LANDesk Provisioning LANDesk Server Manager.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Hands-On Microsoft Windows Server 2008
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Linux Security LINUX SECURITY. Firewall Linux Security Internet Database Application Web Server Firewall.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
TCOM Information Assurance Management System Hacking.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Network Troubleshooting
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Securing the Linux Operating System Erik P. Friebolin.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
SCSC 455 Computer Security Chapter 3 User Security.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
UNIX SYSTEM SECURITY Tanusree Sen Agenda Introduction Three Different Levels of Security Security Policies Security Technologies Future of.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Embedded Linux Conference6 April 2009Jake Edge - LWN.net Security Issues for Embedded Devices Jake Edge LWN.net Slides:
Security Risk Assessment Determine how important your computer is to your group ● Mission critical? ● Sensitive information? ● Expensive hardware? ● Service.
Securing Network Servers
Working at a Small-to-Medium Business or ISP – Chapter 8
Linux Security Presenter: Dolev Farhi |
Operating System Review
Common Methods Used to Commit Computer Crimes
Full Page Watermarking
Configuration for Network Security
Vulnerability Scanning With 'lynis'
Firewalls.
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Operating System Review
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Haifa Linux Club Orr Dunkelman
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
Lesson 16-Windows NT Security Issues
12 STEPS TO A GDPR AWARE NETWORK
Information Security Awareness
SECURITY IN THE LINUX OPERATING SYSTEM
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
Operating System Security
Linux Security.
Securing Windows 7 Lesson 10.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Welcome to all Participants
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Convergence IT Services Pvt. Ltd 10 Ways to Secure your Linux System Convergence IT Services Pvt. Ltd

10 Ways to Secure your Linux System Linux is considered one of the most stable and highly secure open-source OS platforms. Though there is no reason to doubt this claim but at times hackers have brought Linux to its knees through vulnerability which was left unattended by the system admin. Though there is no reason to press the panic button but it is always a good thing to know few security tips to manage your Linux in a much more professional and secure way. By doing this you can really harness the true potential of this highly useful and flexible OS. support.convergenceservices.in

1. Physical System Security This is basic yet so many system admin fail to ensure this level of security. In the physical system security you can configure the BIOS along with that disable booting from CD/DVD, External Devices, Floppy Drive in BIOS. You can also enable BIOS Password and protect GRUB with password so as to restrict physical access to your Linux system. support.convergenceservices.in

2. Use Secure Shell (SSH) Secure Shell (SSH) is a protocol which provides a secure remote access. Protocols like Telnet and rlogin uses simple text which is not encrypted and can cause security breach. On the other hand SSH is a secure and encrypted protocol which can be used for communication with server. Never use default SSH 22 port number rather use higher level port number. support.convergenceservices.in

3. Disk Partitions If you want to have higher data security it is imperative you make different partition of your disk. By doing this you will separate and group data thereby reducing the damage in case disaster strikes. You need to make sure that you must have separate partitions and that third party applications should be installed on separate file systems under/opt. support.convergenceservices.in

4. Check Listening Network Ports Use ‘netstat‘ networking command to view all open ports and associated programs. The ports which are unused should be disabled using the ‘chkconfig’ command. This simple precaution can help system admin to make the Linux Server System. support.convergenceservices.in

5. Disable USB stick to Detect If you ever want to restrict users from using any kind of USB stick in your Linux system so that your data is secure from unauthorized access then you can create a file ‘/etc/modprobe.d/no-usb‘ and adding a line ‘install usb-storage /bin/true’ will not detect USB storage. support.convergenceservices.in

6. Turn on SELinux SELinux or Security-Enhanced Linux is an important access control security mechanism provided in the kernel. So if you want to add an extra layer of security then it is a good idea to keep it on. SELinux offers three basic modes of operation and they are. Enforcing: This is default mode which enables and enforces the SELinux security policy on the machine. Permissive: In this mode, SELinux will not enforce the security policy on the system, only warn and log actions. This mode comes handy when you are troubleshooting SELinux related issues. Disabled: SELinux is turned off. support.convergenceservices.in

7. Enforcing stronger password This looks simple but when implemented can bring some positive results. A large number of users use weak passwords and this might give a easy access to hackers to make the guess work and hack the system with a dictionary based or brute-force attacks. The ‘pam_cracklib‘ module is available in Pluggable Authentication Modules)module stack which will force user to set strong passwords. support.convergenceservices.in

8. Checking account for empty password When an account is having an empty password it means it is opened for unauthorized access, for anyone on the web and it’s a part of security within a Linux server. So it is imperative for all accounts to have a strong and robust password. Empty password accounts can be easily hacked and is a security risk. # cat /etc/shadow| awk -F: '($2==""){print $1}' this command will check if there is any account with empty. support.convergenceservices.in

9. Disable or Remove unwanted services It is highly advised to uninstall unwanted and useless software packages to minimize the risk of vulnerability with your Linux system. Using ‘chkconfig‘ command you can find out services which are running on run level 3. support.convergenceservices.in

10. Monitor User Activities This is a thumb rule to maintain the security of your Linux system yet many a time system admin fail to follow this simple rule. If you have plenty of users, then it’s imperative to collect the data of each user activities and analyze them on the basis of performance and security issues. We even have a tools called ‘psacct‘ and ‘acct‘ for monitoring user activities these tools runs in a system background and constantly tracks each user activity on a system and resources consumed by services such as Apache, MySQL, SSH, FTP, etc. support.convergenceservices.in

About us Convergence Support Desk is a professional website maintenance service provider. If you have your website developed in Joomla, Wordpress or Drupal CMS and are looking to maintain it then please get in touch with us @ +91 22 2513 6632 or Visit support.convergenceservices.in support.convergenceservices.in