Security reinforcement method and system for Linux system

A system security and account security technology, applied in the Internet field, can solve problems such as low efficiency and low safety factor, and achieve the effect of improving efficiency, saving time, and enhancing system security.

Inactive Publication Date: 2016-06-22
上海天脉聚源文化传媒有限公司
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention provides a Linux system security reinforcement method and system, which are used to solve the problems of low efficiency and low safety factor caused by manual modification of Linux server configuration files by system administrators in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security reinforcement method and system for Linux system
  • Security reinforcement method and system for Linux system
  • Security reinforcement method and system for Linux system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0064] like figure 1 As shown, it is a principle flowchart of a Linux system security hardening method provided by Embodiment 1 of the present invention, wherein,

[0065] Step 11, check account security.

[0066] Usually, during the process of system hardening, checking account security is essential. In this embodiment, the inspection of account security mainly includes the following inspections:

[0067] Check for unused regular user accounts. For the account of an ordinary user that does not need to be used, execute passwd-l [ordinary user name] to lock the user. Since there are a large number of user accounts in the system, many common user accounts may have...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security reinforcement method and system for a Linux system. The method includes the following steps that: a weak link in the system is automatically detected, and account security is checked; services unrelated to business are stopped; data access is controlled; network access is controlled; a trust host is limited; a user is authenticated; and an audit strategy is configured, and a series of automatic operations are audited. With the method adopted, security reinforcement work for the Linux system can be completed automatically; all processes that need to be executed manually can be executed automatically, so that time can be save; security reinforcement for the Linux system can be realized quickly; efficiency can be improved; and the security of the system can be enhanced.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a Linux system security strengthening method and system. Background technique [0002] Linux is a set of Unix-like operating systems that are free to use and spread freely. It is a POSIX and UNIX-based multi-user, multi-tasking, multi-threading and multi-CPU operating system. It can run major UNIX utility software, application programs and network protocols. It supports 32-bit and 64-bit hardware. Linux inherits Unix's network-centric design idea and is a multi-user network operating system with stable performance. [0003] Linux is mainly used as an operating system for servers, but its cheapness, flexibility, and Unix background make it suitable for a wider range of applications. Traditionally, there is a Linux-based "LAMP (Linux, Apache, MySQL, Perl / PHP / Python combination)" classic technology combination, which provides a complete set of website construction support in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 张新亮
Owner 上海天脉聚源文化传媒有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products