Cybersecurity Project

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Cybersecurity Project

Os hardening
OS Hardening
• What is OS(operating system) hardening ?
OS hardening  is the act of configuring an OS securely, updating it, creating rules and policies
to help govern the system in a secure manner, and removing unnecessary applications and
services.

• Why must we do OS hardening ?


The purpose of OS hardening is to eliminate as many security risks as possible. It is typically
done by removing all non-essential software programs and utilities from the computer.
Background story
In the past 2 years, there have been many cases about hackers trying to hack
into our database server to access our company finance data and some of
the big company have also encounter this issue recently . My boss is afraid
that this issue might affect us, so he appointed me to help harden the
company operating system. The vm I am using is ubuntu. Hence now I will
be sharing 5 measures on how to prevent hackers from accessing the
computers.
Different types of OS hardening measures
• Firewall configuration
built-in software firewall that allows configuration of port-based traffic from within the OS. It is to
offload the traffic to another device allowing the server to perform its main duty
• Disabling usb-storage driver
USB devices can be loaded with spyware, malware, or Trojans, which can steal your data or damage your
system. By doing this it provides system protection against intrusive USB devices
• Configuring minimum password age
system administrators to defend against bad passwords within an organization. If a user is forced to change
his password periodically, a cracked password is only useful to an intruder for a limited amount of time  
Screenshot for firewall
Before After
Commands for firewall
Before After
Screenshots for malware scanner
Before after
Commands for malware scanner
Before After
Screenshot for disabling usb-storage
driver
Before After
Commands for disabling usb-storage
driver
Before After
More OS hardening measures
• Auditing log file
Audit log file help examine what activities have occurred on the system.it is to
help maintain system stability.
• Malware scanner
  Tool for security monitoring, rootkit hunting, and to detect hidden security
holes. When you download any files or some software from any suspicious
sites, there is a chance that malware gets downloaded to your system or server
without our knowledge.
Auditing log file
Before After
Command for auditing log file
Before after
Screenshots for configuring maximum
password age
Before After
Commands for configuring minimum
password age
Before After

You might also like