8.4 Computer Security and Hardening Systems
The term “hardening systems” comes from the phrase to become a hard target. There are many ways that administrators and security personnel can make systems hard targets, and how systems are hardened depends on their OSs, the role or function the system fulfills in the organization, plus vulnerabilities in the system. In this section, we will present some of the more common methods that are used to make systems hard targets, such as removing dangerous software and turning off unneeded services from both hosts and servers.
8.4.1 Ensuring a Trusted Configuration
Limiting or hiding systems is one of the means of hardening systems. Software and services can be shielded even if a host computer is discovered. ...
Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.