Documente Academic
Documente Profesional
Documente Cultură
Security control
Installation
Check installation medium (cd-rom/dvd/ISO) by using checksum
Determine integrity of the installation medium. Security starts here.
Chec
k
Deterrence
Set a login banner to warn guests of the system that it will be monitored.
Deter unauthorized people to use the system.
Network
Check open network ports
Determine what services are listening with netstat -nlp, nmap localhost
Intrusion Detection
Install and configure file integrity tool (AIDE, Samhain, AFICK)
Monitor for most important files (crown jewels). If they are altered, raise an event to investigate.
Passwords
Configure password aging (chage)
System availability
Configure monitoring
Monitor system resources and hardware status.
Disable CTRL-ALT-DEL
Disable the common combination, to prevent unexpected reboots (e.g. by Windows administrators).
Software
Remove unneeded software
Disable and remove unneeded software. Old packages or installations (including PHP based tools) can increase the risk of a
successful break-in.