Ecommerce Security   «Prev 

Operating System Security

Operating system security is the process of ensuring OS integrity, confidentiality and availability.
OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or intrusions. Operating system security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised. OS security encompasses many different techniques and methods which ensure safety from threats and attacks. OS security allows different applications and programs to perform required tasks and stop unauthorized interference. OS security may be approached in many ways, including adherence to the following:
  1. Performing regular OS patch updates
  2. Installing updated antivirus engines and software
  3. Scrutinizing all incoming and outgoing network traffic through a firewall
  4. Creating secure accounts with required privileges only (i.e., user management)

1) Assign the lowest level of access
1) Users and Groups
  1. Assign the lowest level of access for each user or group that allows it to perform its job.
  2. Carefully examine any default accounts and remove, reset, or rename them as appropriate
  3. Create special accounts for public servers that access resources through the operating system

2) Tightly secure individual directories and programs on your system
2) File System:
  1. Tightly secure individual directories and programs on your system
  2. Partition the physical disk on a program or functional needs basis.
  3. Restrict a service or daemon's access to only a specific partition
  4. In Windows, use NFTS rather than FAT partitions whenever possible

3) Change all default settings
3) System Defaults:
  1. Change all default settings
  2. Locate support accounts (created by the manufacturer for system access in case of a problem.)

4) Contact the operating system vendor for known problems when loading an operating system for the first time or upgrading an existing one.
4) Known Vulnerabilities:
  1. Contact the operating system vendor for known problems when loading an operating system for the first time or upgrading an existing one.
  2. Monitor your operating system vendor's website to keep abreast of security problems
  3. Obtain patches, fixes, and workarounds for problems as they arise. Apply them judiciously so that you do not open up new security holes

5) Remove Unnecessary Services and Ports: 1) Remove any operating system service that you do not specifically require.
5) Remove Unnecessary Services and Ports: 1) Remove any operating system service that you do not specifically require. 2) Conduct a port scan of your system to see what ports you can safely shut down to strengthen your system.

6) Implement security measures that are OS specific
6) 1. Operating System Specific 1) Implement security measures that are OS specific , such as securing the registry in Windows and enabling shadow password in UNIX systems

7) Ensure that you have established operating system policies such as minimum password length, max password age
7) Policies: 1) Ensure that you have established operating system policies such as minimum password length, max password age, and restricted logins

Network Security Essentials