22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9.1.3 Hardening fundamentals summary<br />

This section has provided a very brief introduction to a few popular techniques for<br />

hardening an IT system and the things that system administrators and IT security<br />

people should be mindful of. The rest of the chapter will delve deeper into the<br />

concepts outlined and explain specifically the techniques and methods for<br />

properly hardening the IT Infrastructure.<br />

9.2 Operating system security<br />

The “operating system” defines everything that can be done with an IT system<br />

and the manner in which it is done. Whether it is interacting with the file system,<br />

sending e-mail using Lotus Notes, chatting with someone via Sametime, the<br />

operating system is working behind the scenes to provide the user with a proper<br />

experience as it interprets the requests from the user into something the IT<br />

system can process.<br />

While operating systems vary on many levels, the most common ones provide<br />

much more than a simple interface between user and machine. They include<br />

programs that provide the user with numerous extras, from simple screen savers<br />

to complex file-encryption schemes. However, it's important to understand that<br />

these programs are extras that are added to the OS and are not necessary for<br />

the computer to operate.<br />

Many users become intimately familiar with the operating system's accessories<br />

(such as the games that come bundled with the OS), but forget about the security<br />

features that are included to help them maintain a safe and reliable operating<br />

environment. As a result, many IT systems exist in an insecure state that leaves<br />

them at risk to a virus infection or a complete compromise by an attacker.<br />

This section is dedicated to operating system security issues. The goal is to<br />

explain these special programs in sufficient detail that the process of hardening<br />

them will be easy to understand and accomplish. This is important since it takes<br />

only one virus or Trojan horse to create a ripple effect of infected computers and<br />

compromised IT systems.<br />

9.2.1 Operating system overview<br />

Before delving into the security side of an operating system, it's important to<br />

know where the OS begins and where it ends. This brief overview describes the<br />

functionality and purpose of the operating system and how it's used to create the<br />

computing experience.<br />

Chapter 9. Server hardening 359

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!