Securing Your Nix System

Contributed by Tabitha O. Locklear

There are many different versions of Linux Operating Systems available for use in today’s world of technology. Red Hat Enterprise Edition is one of the most popular Linux Operating Systems for Institutions and Businesses. Red Hat Enterprise Operating System has a server edition and a workstation edition. Red Hat just like many other operating systems does not come pre-configured to be secure. In order to secure the operating system from intruder attacks; after installation you must perform a process that IT professionals call “hardening”. Institutions, Businesses and Corporations usually use their own approach of hardening a system. This paper introduces the basics covered in the standard ISO method of hardening a Red Hat Enterprise system. I have included information about different types of software tools that can be used to test hardening standards applied to a Linux operating system. In follow up there is a brief discussion about ways to check to see if your system has been hacked by an intruder.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet