The Importance Of Security Best Practices

997 Words4 Pages
Security Best Practices “No computer with a connection to the internet is 100 percent safe” (Helmke, 2015). System Administrators have a responsibility to protect individuals and corporations from breaches and loss. A breach can have massive economic implications and, even worse, long lasting damage to your reputation. Linux is just as vulnerable as other operating systems and it appears the majority of best practice methodologies apply across all operating systems. “Security Audits” The first step is to perform a security audit and determine where vulnerabilities may exist. Physical Placement - The system is extremely vulnerable if not installed in a climate controlled secure room. Only authorized personnel should have access to the room…show more content…
Software versions - Additionally, it is good to hide the machine ID and software versions. This is simply free information making it easier for the attacker. Wireless - Helmke (2015) also recommends using wired and avoiding wireless if possible. NMAP - Another vulnerability is open ports. Tools such as NMAP scan and determine if any ports are open. Unexpected open ports are clues that a potential breach has occurred and that a cracker has opened unauthorized ports. Intrusion Detection Systems – IDS should be installed that contain the capabilities to monitor the network and send alerts if odd or different behavior is observed. “Protect your system” Update Linux kernel and Software – Regular updates are critical to insure the system has the most stable and reliable load. Viruses –Linux has an advantage over Windows. Helmke (2015) explains, • “Linux never puts the current directory in your executable path, so typing ls runs /bin/ls rather than any program named ls in the current directory. • A nonroot user can infect only the files that user has write access to, which is usually only the files in the user’s home directory. This is one of the most important reasons for never using sudo when you don’t need to. • Linux forces you to manually mark files as executable, so you can’t accidentally run a file called myfile.txt.exe thinking it is just a text file. • By having more than one common web browser and email client, Linux has strength through
Open Document