Linux servers used around the world dominantly on the internet. They are used as a web server, file server, application server, etc. Being on the internet creates som risk for these systems. There are different risks on the internet. One of them is automated attackers who use scripts and tool in an automated fashion. Linux systems should be protected this type of attackers too. Here I will provide some tips about protecting our system from these attacks.
Chose and Use Strong Passwords
Passwords are main method to authenticate into a Linux system. We should chose passwords that are unique like q34w3+Tsef34 which is not used before anywhere in the world. Do not use passwords like 123456 which is known already by an attacker.
Disable Unused Services and Ports
Unused ports provide extra risk to us. If a vulnerability is disclosed about the telnet service we do not use it will be very frustrating for us.
Disable Root Logins
Using normal user with unique name login to the Linux system and then get root privilege is safer.
Automatic System Update
Vulnerabilities disclosed every second. How can we track if our system has a vulnerable package? It is hard to track in real-time. But attacks occur in real-time. So setup system update automatic.
Change Default Port Numbers
Change default port numbers used by only you for management. For example, we can change the ssh port from 22 to 65534 to hide it some of the attackers.
Change Default Passwords
After setup and installation, there will be some default passwords and users. Change them right now 🙂