Protect Yourself
This chapter will show you how to protect yourself comupter and your services.
Wish it can help you.
- No Default Password , Change it And Use A Strong Password Policy
- Change Some Default Port , like ssh
Close Unnecessary Port
Logging your service information
- MAC Address
- IP Address
- Head of the host
- Date Time
- Asset number
- Other Useful Information
- Keep your Linux Kenel and Sofware Up to Date
- Locking User Accounts After Login Failures
- Make Sure No Non-Root Accounts Have UID Set To 0
- No root to Directly Access Server
- Use Access Control List (Blacklist or Whitelist)
- Appropriate Permission
- Close Unnecessary Service
- Delete X Windows
- Make Strategy to avoid Vulnerability
- Configure Iptables and TCP Wrappers
- BIOS Protect
- Encypt your disk and protect your disk
bootdirectory was only read- No USB Access
- Security your SSH
- Only Access from special host
- Use two factor authorization
- change default port
- NO root login
- Avoid be vulnerable
- Use IDS(Intrusion Detection System )
- Protect your Directories and Email
When you do something , Just Ask yourself , What I want, Whether if It can be more Security ? Did there another way to make it easily ? You should ask yourself many times when you make a choice.
Reference :
- Linux Security : https://www.cyberciti.biz/tips/linux-security.html
- Protect your system : http://www.freebuf.com/articles/system/121540.html