“From a security professional’s perspective, a number of common
Linux distributions are insecure ‘out of the box,’ and many of the
supplied packages are already out of date by the time they reach
the shelves. As the security of one’s computer and more importantly
its data is a priority concern, there are a number of steps that
should be taken at the time of installation to secure one’s
operating system as well as to help identify attempted or
successful attacks.“These steps are listed below and each is expanded on in detail
in the sections that follow.
- “Installation and configuration of an effective firewall
- “The (automatic) updating of all installed packages
- “Stopping and disabling of all unnecessary services
- “Locating and removing/altering unnecessary SUID/SGID’s
- “Logwatch and Tripwire…”