Strategies for preventing intrusions:
Process to avoid threats when building a system:
System security planning process:
Steps to hardening the OS:
Initial steps to setup an OS:
Security maintenance includes:
Backup:
Making copies of data regularly
Archive:
Keeping copies of data over a long time
Local exploit:
Software vulnerability exploited for elevated privileges
Remote exploit:
Software vulnerability in a network server triggered by a remote attacker
Chroot jail:
Restriction on server’s view to just a specified directory (jail)
User Account Control (UAC):
Controls that assure users use administrative rights only when required
Virtualization:
Abstraction of resources used by software running in virtual machines
Hypervisor:
Resource broker between hardware and VM
Hypervisor:
Resource broker between hardware and VM
Hypervisor functions:
Full virtualization variations:
Software Defined Networks (SDNs):
Segments of the same physical network spanning multiple servers
Virtualization security concerns:
Virtual firewall:
Firewall for traffic between systems in the same virtualized environment