- Practical Network Scanning
- Ajay Singh Chauhan
- 131字
- 2022-07-12 10:43:11
Server-Level Security
In the previous chapter, we discussed how to build a secure network infrastructure. In this chapter, we will discuss how to build and ensure security for servers inside a secure network.
Server/computer security is a critical part of the infrastructure for running business smoothly. Information security has evolved over the years due to an increasing dependency on public networks not to disclose personal, financial, and other restricted information. Consequently, it becomes important to maintain data confidentiality, integrity and availability. This chapter focuses on securing data and implementing various policies to secure a server infrastructure.
We will cover the following topics in this chapter:
- Classification of data
- Physical security
- Disk encryption
- Hardening server security
- Authentication NTLM versus Kerberos
- Password policies
- Server-level permissions
- Server antivirus and malware protection
- Local security policies
推薦閱讀
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 開發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- 計(jì)算機(jī)病毒分析與防范大全(第3版)
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- .NET安全攻防指南(上冊)
- 同態(tài)密碼學(xué)原理及算法
- Computer Forensics with FTK
- 云原生安全與DevOps保障
- 黑客攻防從入門到精通
- Developing Applications with Salesforce Chatter
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐
- 惡意軟件、Rootkit和僵尸網(wǎng)絡(luò)
- 大話數(shù)據(jù)恢復(fù)
- Cisco Firepower威脅防御(FTD)設(shè)備的高級排錯(cuò)與配置