.

Thursday, December 20, 2018

'Creating a server (Linux)\r'

'For this kind of scenario, I would ca-ca to create a innkeeper from summon so I croupe be adequate to(p) to identify every(prenominal) types of vulnerabilities on whatever of these innkeeper requirements utter below. Any of these can be at put on the line at whatever time, so creating a new server from scratch would be around recommended. Because it is kind of safer than Windows because most viruses and worms be written for Windows that it doesn’t mean Linux can be attacked.Server Requirements:A Web ServerA database serverA Simple send out beam Protocol (SMTP) serverA file cabinet server customers’ impart applications and other individual(prenominal) data files frontmost of all, since Linux is mostly an control surface-source type of computer package running server, it is very vulnerable to any kinds of attacks, or as Linux calls them, firecrackers. Many cattish attacks on Linux and related applications will in like manner grow. The Web Serve r isn’t much(prenominal) of a risk because but it is comfort an important software program that can have a proud risk of cosmos attacked because it’s known as an open-source, so having any personal information stored inwardly it, can be at risk of being exposed to a cracker (hacker).The Database Server is a very high risk of vulnerabilities because this is where important data and files are being stored in. Again, this is still an open-source software so protecting this kind of software is important to the company. A Simple Mail Transfer Protocol (SMTP) and a file server for customers’ loan applications and other personal data files are a essential protect! These are open-sources too, so essentially all of these server requirements are open source, no surprise. But protecting all these will require a bent of attention especially the SMTP, file server for customers’ and the database server. Here are some locomote/tools that you can use to stop an y kinds of attacks upon these servers: Identify any risks/vulnerabilities these servers have: plainspoken portsNessusOpenSSH/PuTTY/SSHBurp SuiteThere’s more of these but these are the basics of protecting your Linux musical arrangement from attacks. Follow these steps and you’ll be able to have any risks on your Linux systems.\r\n'

No comments:

Post a Comment