Because Linux is only as secure as it is configured to be, the user must take many precautions to ensure that the server stays secure. Having very little or no security at all can pose a great problem for the system, network, and server, not to mention the company involved. If the server is not secure, the company can be in big trouble as private information can be leaked. Important data that should only been seen by certain employees can possibly be seen by all employees. This could cause a huge problem. Setting file permissions will ensure that only those employees who are supposed to see the private information, will be the only ones to see it. File permissions need to be set by department. For example, employees in marketing does not need to see files from anyone …show more content…
Setting file permissions is a form of DAC because it is the owner’s discretion. Configuring as many security layers as the user can will ensure the server will stay secure. Not all OS are 100% secure, but they can be configured to make it very hard for a hacker to …show more content…
One way of making sure your server is secure it to enable the iptables. If unauthorized access is attempted, iptables (firewall) will ensure the access will be denied. Another way of securing the server is by using Secure Shell (SSH) which is a secure protocol. Any communication with the server is encrypted with SSH. SSH can be configured to restrict user access. Physical access can be restricted by enabling BIOS password and protecting GRUB with a password. This will restrict the physical access, as will disabling boot access from a CD/DVD and any external devices by configuring the BIOS to disable booting. There is no need to have a variety of services installed. If you don’t use them, don’t install them. Packages can be useless and can pose a threat with vulnerabilities. Avoid doing that. You should also find any unwanted services from the