Friday, May 17, 2019

Creating a server (Linux)

For this kind of scenario, I would have to create a master of ceremonies from scratch so I can be able to identify whatever types of vulnerabilities on any of these server requirements stated below. Any of these can be at luck at any time, so creating a new server from scratch would be most recommended. Because it is kind of safer than Windows because most viruses and worms atomic number 18 scripted for Windows but it doesnt mean Linux can be attacked.Server RequirementsA Web ServerA database serverA Simple Mail stir Protocol (SMTP) serverA deposit server customers loan applications and other personal data files First of exclusively, since Linux is mostly an open-source type of softw be running server, it is very vulnerable to any kinds of attacks, or as Linux calls them, crackers. Many malevolent attacks on Linux and related applications will also grow. The Web Server isnt much of a risk because but it is still an important software that can have a naughty risk of macrocosm attacked because its known as an open-source, so having any personal information stored inside it, can be at risk of being exposed to a cracker (hacker).The Database Server is a very high risk of vulnerabilities because this is where important data and files are being stored in. Again, this is still an open-source software so protect this kind of software is important to the company. A Simple Mail Transfer Protocol (SMTP) and a file server for customers loan applications and other personal data files are a must protect These are open-sources too, so basically all of these server requirements are open source, no surprise. But protecting all these will require a lot of attention especially the SMTP, file server for customers and the database server. Here are some go/tools that you can use to stop any kinds of attacks upon these servers Identify any risks/vulnerabilities these servers have decipherable portsNessusOpenSSH/PuTTY/SSHBurp SuiteTheres more of these but these are the basic s of protecting your Linux system from attacks. Follow these steps and youll be able to have any risks on your Linux systems.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.