Operating system hardening for a Linux operating system can be automated and needs to be performed in high security environments. Automated hardening is needed in virtual environments with lots of instances. Also, for identical system environments deployment automation is essential. Automatic system hardening is a well-established administration procedure. The purpose of this work was to combine several tools and guides in one text and to obtain a low-level guide for a secure virtual environment. In this Bachelor's Thesis work, theory of Linux operating system hardening was studied and a study on automated installation of hardened Linux operating systems, according to the USGCB security standard, was performed. Also, the security st...
Security is more important than ever, and since we are storing much of our sensitive data on hard dr...
The main objective is the investigation of possibilities of elevating existing and old information s...
Tutkielmassa selvitettiin tärkeimpiä Windowsin suojausmenetelmiä kaikkein yleisimpiä kyberuhkia vast...
Hardening improves security by removing unnecessary features from the system. Hardening can be perfo...
Ett stridsledningssystem fungerar som ett maskinellt stöd för manövrering och kontroll över trupper....
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
In this chapter the authors present essential server security components and develop a set of logica...
Recent public, high-profile vulnerabilities in widely used IT architecture components pose a signifi...
Operating system hardening is the process to address security weaknesses in the operation systems by...
Deploying a Debian operating system into the Internet as a service can be daunting at first since it...
Conducting risk assessments is a vital part of securing information systems. The task of conducting ...
Since the industrial era 4.0, the advancement of IT has become a practical architecture. By practica...
Confidentiality, integrity and availability are all important factors to consider in information sec...
The security of Linux depends on many configuration file both at system level and application level....
Security Hardening is the process of configuring IT systems to ensure the security of the systems' c...
Security is more important than ever, and since we are storing much of our sensitive data on hard dr...
The main objective is the investigation of possibilities of elevating existing and old information s...
Tutkielmassa selvitettiin tärkeimpiä Windowsin suojausmenetelmiä kaikkein yleisimpiä kyberuhkia vast...
Hardening improves security by removing unnecessary features from the system. Hardening can be perfo...
Ett stridsledningssystem fungerar som ett maskinellt stöd för manövrering och kontroll över trupper....
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
In this chapter the authors present essential server security components and develop a set of logica...
Recent public, high-profile vulnerabilities in widely used IT architecture components pose a signifi...
Operating system hardening is the process to address security weaknesses in the operation systems by...
Deploying a Debian operating system into the Internet as a service can be daunting at first since it...
Conducting risk assessments is a vital part of securing information systems. The task of conducting ...
Since the industrial era 4.0, the advancement of IT has become a practical architecture. By practica...
Confidentiality, integrity and availability are all important factors to consider in information sec...
The security of Linux depends on many configuration file both at system level and application level....
Security Hardening is the process of configuring IT systems to ensure the security of the systems' c...
Security is more important than ever, and since we are storing much of our sensitive data on hard dr...
The main objective is the investigation of possibilities of elevating existing and old information s...
Tutkielmassa selvitettiin tärkeimpiä Windowsin suojausmenetelmiä kaikkein yleisimpiä kyberuhkia vast...