Server Hardening: Securing Unix-like workstations

Authors

  • Bhardwaj Y Computer Science and Engineering, Guru Gobind Singh Indraprastha University, India

Keywords:

Linux, Unix, Hardening, Security, Server

Abstract

In this fast-paced and dynamic world of data communication, systems and software development, and uncontrolled network traffic, security is becoming more and more of an issue. Surprisingly, many organizations, as well as individual users regard security as more of an afterthought (proper security implementation is often enacted after an unauthorized intrusion has already occurred) , a process that is overlooked in favor of increased productivity, convenience, ease of use, and budgetary concerns. Security on Linux systems never stays static. Once secured, the system does not perpetually stay secure. Indeed, the longer one uses the system, the less secure it becomes.
This document provides general practices, procedures, planning and tools for creating a secured computing environment for the data center, workplace, or at home. It is aimed for engineers, IT managers, security and system administrators, who are assumed to possess basic system administration skills for Unix-like systems. It addresses basic security vulnerabilities, local and remote intrusion, exploitation and malicious activity techniques valid for all Linux systems.

References

J. Turnbull, “Hardening Linux”, Apress, 2005

K. Fenzi, Dave Wreski, “Linux Security HOWTO ”, v2.3, 22 January 2004,

http://www.tldp.org/HOWTO/Security-HOWTO/

National Security Agency, “Guide to the Secure Configuration of Red Hat Enterprise Linux 5 ”,

Revision 4.1, February 28, 2011, https://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf

M. Prpič, T. Čapek, S. Wadeley, Y. Ruseva, M. Svoboda, R. Krátký, “Red Hat Enterprise Linux 6 Security Guide”,

Red Hat, Inc., 2013,https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/

Downloads

Published

2015-03-31

How to Cite

[1]
Y. Bhardwaj, “Server Hardening: Securing Unix-like workstations”, Int. J. Comp. Sci. Eng., vol. 3, no. 3, pp. 24–32, Mar. 2015.

Issue

Section

Technical Article