Web server system maintenance and security configuration
- 2020-05-06 12:04:44
- OfStack
1. Physical security
Physical security refers to the prevention of accidents or man-made damage to specific physical equipment, such as servers, switches, routers, cabinets, lines, etc. The key of machine room and cabinet must manage well, do not let irrelevant personnel enter machine room at will, especially the center of the network machine room, prevent the deliberate destruction of people.
2. Set security
Setting security refers to the necessary Settings on the device (such as the password of the server, switch, etc.) to prevent hackers from gaining remote control of the hardware equipment. For example, many network administrators often do not set the necessary password on the server or the switch that can be managed. People who understand the technology of network equipment management can gain control of the server or switch through the network, which is very dangerous. Because the router belongs to the access equipment, it is bound to be exposed to the Internet hacker attack in the field of vision, so it needs to take more stringent security management measures, such as password encryption, loading strict access list.
Software system security protection
Compared with hardware systems, software systems have the most security problems and are the most complex. Let's focus on the security of software systems.
The TCP/IP protocol is now used on a wide variety of networks. But TCP/IP originated as Internet, and Internet in its early days was an open Internet for researchers and an entirely non-profit information sharing vehicle, so almost all Internet protocols have no security mechanisms in mind. Another reason for network insecurity is that it is easy for people to obtain relevant core technical information from Internet, especially technical information about Internet itself and various hacker software, which can easily cause network security problems.
Safety precautions
In the face of the emerging network security problems we are not helpless, can be from the following aspects, we can do to prevent.
1. Install the patch
Any operating system has vulnerabilities, and it is the responsibility of the network system administrator to type the "patch" (Patch) in a timely manner. Most sme servers use Microsoft's Windows NT / 2000/2003 operating system, and because so many people are using it, Bug is found to be particularly numerous, as is the number of people deliberately attacking them. To fix security holes in its operating system, Microsoft offers a number of patches on its web site that can be downloaded and installed. For Windows2003, at least upgrade to SP1; for Windows 2000, at least upgrade to Service Pack 2; and for Windows NT 4.0, at least upgrade to Service Pack 6.
2. Install and set up firewall
There are now many firewalls based on hardware or software, such as products from manufacturers such as rising star. Installing a firewall is essential for an enterprise Intranet. A firewall is a good protection against illegal access, but it doesn't just install a firewall and everything is fine, it needs to be set up properly to work. If you do not understand the firewall Settings, you need to ask technical support staff to help set up.
3. Install network antivirus software
The virus on the network is very rampant now, this needs to install the network version of the antivirus software on the network server to control the spread of the virus, at present, most anti-virus manufacturers have launched the network version of the antivirus software; At the same time, in the network version of antivirus software use, must be regular or timely upgrade antivirus software.
4.
account and password protection
Account and password protection can be said to be the system's first line of defense, most attacks on the system on the Internet are intercepted or guess the password to start. Once the hackers into the system, then the previous defense measures are almost useless, so the server system administrator account and password management is very important to ensure the security of the system measures.
The system administrator password must be large, at least should be more than 8 digits, and do not set easy to guess the password, such as their name, date of birth, etc. For ordinary users, set certain account management policies, such as forcing users to change their passwords once a month. Close accounts that are not commonly used, such as anonymous login accounts.
5. Monitoring system log
By running the system logger, the system will record all users using the system, including the most recent login time, the account used, the activities carried out, and so on. The logger generates reports on a regular basis, and by analyzing the reports, you can see if there are any anomalies.
6. Turn off unwanted services and port
When the server operating system is installed, it will start some unnecessary services, which will occupy the resources of the system and also increase the security risks of the system. For servers that are not used during the holidays, you can shut them down completely. For servers to be used during the holiday season, turn off unwanted services such as Telnet. Also, close ports TCP that are not necessarily open.
7. Regularly backup
server
A secure backup of the system is required to prevent unexpected system failures or improper user actions. In addition to a monthly system-wide backup, a weekly backup of modified data should be performed. At the same time, important system files that have been modified should be stored on different servers so that in the event of a system crash (usually a hard disk failure), the system can be restored to its normal state in a timely manner.
Physical security refers to the prevention of accidents or man-made damage to specific physical equipment, such as servers, switches, routers, cabinets, lines, etc. The key of machine room and cabinet must manage well, do not let irrelevant personnel enter machine room at will, especially the center of the network machine room, prevent the deliberate destruction of people.
2. Set security
Setting security refers to the necessary Settings on the device (such as the password of the server, switch, etc.) to prevent hackers from gaining remote control of the hardware equipment. For example, many network administrators often do not set the necessary password on the server or the switch that can be managed. People who understand the technology of network equipment management can gain control of the server or switch through the network, which is very dangerous. Because the router belongs to the access equipment, it is bound to be exposed to the Internet hacker attack in the field of vision, so it needs to take more stringent security management measures, such as password encryption, loading strict access list.
Software system security protection
Compared with hardware systems, software systems have the most security problems and are the most complex. Let's focus on the security of software systems.
The TCP/IP protocol is now used on a wide variety of networks. But TCP/IP originated as Internet, and Internet in its early days was an open Internet for researchers and an entirely non-profit information sharing vehicle, so almost all Internet protocols have no security mechanisms in mind. Another reason for network insecurity is that it is easy for people to obtain relevant core technical information from Internet, especially technical information about Internet itself and various hacker software, which can easily cause network security problems.
Safety precautions
In the face of the emerging network security problems we are not helpless, can be from the following aspects, we can do to prevent.
1. Install the patch
Any operating system has vulnerabilities, and it is the responsibility of the network system administrator to type the "patch" (Patch) in a timely manner. Most sme servers use Microsoft's Windows NT / 2000/2003 operating system, and because so many people are using it, Bug is found to be particularly numerous, as is the number of people deliberately attacking them. To fix security holes in its operating system, Microsoft offers a number of patches on its web site that can be downloaded and installed. For Windows2003, at least upgrade to SP1; for Windows 2000, at least upgrade to Service Pack 2; and for Windows NT 4.0, at least upgrade to Service Pack 6.
2. Install and set up firewall
There are now many firewalls based on hardware or software, such as products from manufacturers such as rising star. Installing a firewall is essential for an enterprise Intranet. A firewall is a good protection against illegal access, but it doesn't just install a firewall and everything is fine, it needs to be set up properly to work. If you do not understand the firewall Settings, you need to ask technical support staff to help set up.
3. Install network antivirus software
The virus on the network is very rampant now, this needs to install the network version of the antivirus software on the network server to control the spread of the virus, at present, most anti-virus manufacturers have launched the network version of the antivirus software; At the same time, in the network version of antivirus software use, must be regular or timely upgrade antivirus software.
4.
account and password protection
Account and password protection can be said to be the system's first line of defense, most attacks on the system on the Internet are intercepted or guess the password to start. Once the hackers into the system, then the previous defense measures are almost useless, so the server system administrator account and password management is very important to ensure the security of the system measures.
The system administrator password must be large, at least should be more than 8 digits, and do not set easy to guess the password, such as their name, date of birth, etc. For ordinary users, set certain account management policies, such as forcing users to change their passwords once a month. Close accounts that are not commonly used, such as anonymous login accounts.
5. Monitoring system log
By running the system logger, the system will record all users using the system, including the most recent login time, the account used, the activities carried out, and so on. The logger generates reports on a regular basis, and by analyzing the reports, you can see if there are any anomalies.
6. Turn off unwanted services and port
When the server operating system is installed, it will start some unnecessary services, which will occupy the resources of the system and also increase the security risks of the system. For servers that are not used during the holidays, you can shut them down completely. For servers to be used during the holiday season, turn off unwanted services such as Telnet. Also, close ports TCP that are not necessarily open.
7. Regularly backup
server
A secure backup of the system is required to prevent unexpected system failures or improper user actions. In addition to a monthly system-wide backup, a weekly backup of modified data should be performed. At the same time, important system files that have been modified should be stored on different servers so that in the event of a system crash (usually a hard disk failure), the system can be restored to its normal state in a timely manner.