Server Hardening: Securing Unix-like workstations
Yogender Bhardwaj1
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-3 , Page no. 24-32, Mar-2015
Online published on Mar 31, 2015
Copyright © Yogender Bhardwaj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Yogender Bhardwaj, “Server Hardening: Securing Unix-like workstations,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.24-32, 2015.
MLA Style Citation: Yogender Bhardwaj "Server Hardening: Securing Unix-like workstations." International Journal of Computer Sciences and Engineering 3.3 (2015): 24-32.
APA Style Citation: Yogender Bhardwaj, (2015). Server Hardening: Securing Unix-like workstations. International Journal of Computer Sciences and Engineering, 3(3), 24-32.
BibTex Style Citation:
@article{Bhardwaj_2015,
author = {Yogender Bhardwaj},
title = {Server Hardening: Securing Unix-like workstations},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2015},
volume = {3},
Issue = {3},
month = {3},
year = {2015},
issn = {2347-2693},
pages = {24-32},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=414},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=414
TI - Server Hardening: Securing Unix-like workstations
T2 - International Journal of Computer Sciences and Engineering
AU - Yogender Bhardwaj
PY - 2015
DA - 2015/03/31
PB - IJCSE, Indore, INDIA
SP - 24-32
IS - 3
VL - 3
SN - 2347-2693
ER -
VIEWS | XML | |
2676 | 2516 downloads | 2621 downloads |
Abstract
In this fast-paced and dynamic world of data communication, systems and software development, and uncontrolled network traffic, security is becoming more and more of an issue. Surprisingly, many organizations, as well as individual users regard security as more of an afterthought (proper security implementation is often enacted after an unauthorized intrusion has already occurred) , a process that is overlooked in favor of increased productivity, convenience, ease of use, and budgetary concerns. Security on Linux systems never stays static. Once secured, the system does not perpetually stay secure. Indeed, the longer one uses the system, the less secure it becomes. This document provides general practices, procedures, planning and tools for creating a secured computing environment for the data center, workplace, or at home. It is aimed for engineers, IT managers, security and system administrators, who are assumed to possess basic system administration skills for Unix-like systems. It addresses basic security vulnerabilities, local and remote intrusion, exploitation and malicious activity techniques valid for all Linux systems.
Key-Words / Index Term
Linux, Unix, Hardening, Security, Server
References
[1] J. Turnbull, “Hardening Linux”, Apress, 2005
[2] K. Fenzi, Dave Wreski, “Linux Security HOWTO ”, v2.3, 22 January 2004,
http://www.tldp.org/HOWTO/Security-HOWTO/
[3] National Security Agency, “Guide to the Secure Configuration of Red Hat Enterprise Linux 5 ”,
Revision 4.1, February 28, 2011, www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf
[4] M. Prpič, T. Čapek, S. Wadeley, Y. Ruseva, M. Svoboda, R. Krátký, “Red Hat Enterprise Linux 6 Security Guide”,
Red Hat, Inc., 2013, access.redhat.com/documentation/ en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/