Server Security

Issues:

Vocabulary:

Server: A frequently used term with lots of meanings!

  1. A general-purpose computer meant to communicate to other computers, often in a non-peer way. For example, the server computer for a school might use NT and host lots of programs and files shared by other computers.
  2. Particular software meant to "serve" information. For example, Apache httpd is Web server software used by many computers to send Web pages to the world
  3. Some combination of #1 and #2.

Major threats:

  1. Internet hackers: if your system is on the Internet, it will be subjected to attacks -- even if it is "hidden" or private. Only a firewall or similar security system can stop hackers can reaching your system (obscurity doesn't work).
  2. Internal abusers: People with legitimate access to your servers will attempt things they shouldn't (sometimes by mistake, other times on purpose). There are probably fewer people inside your organization who will try to gain such access than there are outside (outside hackers), but they will have several advantages to make them harder to stop.
  3. Viruses, etc.: they are not as much an issue with server computers because server operating system software (NT, Novell, Unix) enforces access controls. However, a hacker would want to insert a trojan horse program that looks legitimate, but actually does something undesirable.

What to do?

  1. Devise policy for who should have access to what
  2. Understand your software and have it installed correctly
  3. Keep posted of new security problems, patches to software, etc. and upgrade frequently (easier a little at a time than a large change later!). Remember, thousands of hackers are also keeping informed this way!
  4. Watch the logs
  5. Keep good backups. Stuff happens.
  6. Install Tripwire or another file integrity checker
  7. Consider a firewall or other network access control device for Internet access
    Themes
    PCs: viruses, trojans, and shared systems
    Servers: file protection, access control, server software vulnerabilities
    Privacy: policy, copyright, laws, internationalization
    Data integrity: encryption, IP security
    Resources on Computer Security