0% found this document useful (0 votes)
44 views

Application Hardening: Visit For More Learning Resources

This document discusses application hardening techniques at different levels including the host, application, operating system, user, and physical levels. It provides examples of hardening activities like keeping security patches updated, installing a firewall, strong passwords, and removing unnecessary programs. Specific hardening techniques are described for Windows like using NTFS and disabling guest accounts, and for Linux like creating a firewall and enabling password aging. The document also defines terms like hot fixes, patches, updates, service packs, web servers, and Active Directory.

Uploaded by

asha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Application Hardening: Visit For More Learning Resources

This document discusses application hardening techniques at different levels including the host, application, operating system, user, and physical levels. It provides examples of hardening activities like keeping security patches updated, installing a firewall, strong passwords, and removing unnecessary programs. Specific hardening techniques are described for Windows like using NTFS and disabling guest accounts, and for Linux like creating a firewall and enabling password aging. The document also defines terms like hot fixes, patches, updates, service packs, web servers, and Active Directory.

Uploaded by

asha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Chapter 6

Application Hardening

Visit for more Learning Resources


Application Hardening
• Make your computer hard to break
• Providing protection to your computer system
• Protection is provided in various layers like at
the host level, the application level, the
operating system level, the user level, the
physical level and all the sublevels in between.
• Each level requires a unique method of
security.
Hardening activities for a computer system
can include:
• Keeping security patches and hot fixes updated
• Monitoring security bulletins that are applicable to a system’s
operating system and applications
• Installing a firewall
• Closing certain ports such as server ports
• Not allowing file sharing among programs
• Installing virus and spyware protection, including an anti-
adware tool so that malicious software cannot gain access to
the computer on which it is installed
• Keeping a backup, such as a hard drive, of the computer
system
• Disabling cookies
• Creating strong passwords
• Never opening emails or attachments from unknown
senders
• Removing unnecessary programs and user accounts from
the computer
• Using encryption where possible
• Hardening security policies, such as local policies relating
to how often a password should be changed and how
long and in what format a password must be in
Windows hardening
• Use NTFS on all the partitions
• Disabling simple file sharing
• Disable guest account
• Installing antivirus software on computer
• Encrypt temp folder
• Install latest service packs
• Implementing IPSec
Linux Hardening
• Create firewall
• Use secure alternatives
• Copy your logs
• Enable password aging
• Keep an eye on open files
Hot fix
• Address specific issues e.g buffer overflow
• Smallest size files
• Many 3rd part s/w programs provides this
functionality
• Produced quickly
Patches
• Fix the general problems
• Supplied from vendors
• Large size files as compare to hot fix
Updates
• New version of s/w and h/w product design to
replace a older version of same product .
Service packs
• It is collection of updates, fixes to a software
program delivered in form of single installable
packet
• Easy installation
• Less error prone
• It is incremental
Web Server
• Sends static pages to large no of users
• Provides web pages to client
• e.g
– Apache Server
– Microsoft Internet Information Server(IIS)
Active Directory
• Manages the computer groups ,users who
access computer network
• Used by network administrators.

For more detail contact us

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy