In this chapter, you will learn to:
Hardening a system involves closing the potential security holes. Examples of security holes include unnecessary software and user accounts, unused services, and unused network ports. Hardening a system improves the security of that system by decreasing the number of potential attack vectors. Don’t risk running an insecure system, unless you run a completely isolated system or you simply do not care if the system becomes compromised. And, don’t forget that there are many legal requirements that oblige you to secure your systems.