Open Access   Article Go Back

Server Hardening: Securing Unix-like workstations

Yogender Bhardwaj1

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-3 , Page no. 24-32, Mar-2015

Online published on Mar 31, 2015

Copyright © Yogender Bhardwaj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Yogender Bhardwaj, “Server Hardening: Securing Unix-like workstations,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.24-32, 2015.

MLA Style Citation: Yogender Bhardwaj "Server Hardening: Securing Unix-like workstations." International Journal of Computer Sciences and Engineering 3.3 (2015): 24-32.

APA Style Citation: Yogender Bhardwaj, (2015). Server Hardening: Securing Unix-like workstations. International Journal of Computer Sciences and Engineering, 3(3), 24-32.

BibTex Style Citation:
@article{Bhardwaj_2015,
author = {Yogender Bhardwaj},
title = {Server Hardening: Securing Unix-like workstations},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2015},
volume = {3},
Issue = {3},
month = {3},
year = {2015},
issn = {2347-2693},
pages = {24-32},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=414},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=414
TI - Server Hardening: Securing Unix-like workstations
T2 - International Journal of Computer Sciences and Engineering
AU - Yogender Bhardwaj
PY - 2015
DA - 2015/03/31
PB - IJCSE, Indore, INDIA
SP - 24-32
IS - 3
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2676 2516 downloads 2621 downloads
  
  
           

Abstract

In this fast-paced and dynamic world of data communication, systems and software development, and uncontrolled network traffic, security is becoming more and more of an issue. Surprisingly, many organizations, as well as individual users regard security as more of an afterthought (proper security implementation is often enacted after an unauthorized intrusion has already occurred) , a process that is overlooked in favor of increased productivity, convenience, ease of use, and budgetary concerns. Security on Linux systems never stays static. Once secured, the system does not perpetually stay secure. Indeed, the longer one uses the system, the less secure it becomes. This document provides general practices, procedures, planning and tools for creating a secured computing environment for the data center, workplace, or at home. It is aimed for engineers, IT managers, security and system administrators, who are assumed to possess basic system administration skills for Unix-like systems. It addresses basic security vulnerabilities, local and remote intrusion, exploitation and malicious activity techniques valid for all Linux systems.

Key-Words / Index Term

Linux, Unix, Hardening, Security, Server

References

[1] J. Turnbull, “Hardening Linux”, Apress, 2005
[2] K. Fenzi, Dave Wreski, “Linux Security HOWTO ”, v2.3, 22 January 2004,
http://www.tldp.org/HOWTO/Security-HOWTO/
[3] National Security Agency, “Guide to the Secure Configuration of Red Hat Enterprise Linux 5 ”,
Revision 4.1, February 28, 2011, www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf
[4] M. Prpič, T. Čapek, S. Wadeley, Y. Ruseva, M. Svoboda, R. Krátký, “Red Hat Enterprise Linux 6 Security Guide”,
Red Hat, Inc., 2013, access.redhat.com/documentation/ en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/