Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Hardening (computing)

Index Hardening (computing)

In computing, hardening is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle a single-function system is more secure than a multipurpose one. [1]

23 relations: Address space layout randomization, Attack surface, Computer security, Computing, Daemon (computing), Exec Shield, Firewall (computing), Intrusion detection system, Kernel (operating system), Linux, Login, Lynis, Network security policy, Patch (computing), PaX, Port (computer networking), Position-independent code, Scripting language, Security-Enhanced Linux, Security-focused operating system, Solaris (operating system), Unix, User (computing).

Address space layout randomization

Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities.

New!!: Hardening (computing) and Address space layout randomization · See more »

Attack surface

The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker") can try to enter data to or extract data from an environment.

New!!: Hardening (computing) and Attack surface · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Hardening (computing) and Computer security · See more »

Computing

Computing is any goal-oriented activity requiring, benefiting from, or creating computers.

New!!: Hardening (computing) and Computing · See more »

Daemon (computing)

In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.

New!!: Hardening (computing) and Daemon (computing) · See more »

Exec Shield

Exec Shield is a project started at Red Hat, Inc in late 2002 with the aim of reducing the risk of worm or other automated remote attacks on Linux systems.

New!!: Hardening (computing) and Exec Shield · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Hardening (computing) and Firewall (computing) · See more »

Intrusion detection system

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.

New!!: Hardening (computing) and Intrusion detection system · See more »

Kernel (operating system)

The kernel is a computer program that is the core of a computer's operating system, with complete control over everything in the system.

New!!: Hardening (computing) and Kernel (operating system) · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Hardening (computing) and Linux · See more »

Login

In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.

New!!: Hardening (computing) and Login · See more »

Lynis

Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix-derivatives.

New!!: Hardening (computing) and Lynis · See more »

Network security policy

A network security policy, or NSP, is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment.

New!!: Hardening (computing) and Network security policy · See more »

Patch (computing)

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it.

New!!: Hardening (computing) and Patch (computing) · See more »

PaX

PaX is a patch for the Linux kernel that implements least privilege protections for memory pages.

New!!: Hardening (computing) and PaX · See more »

Port (computer networking)

In computer networking, a port is an endpoint of communication in an operating system, which identifies a specific process or a type of network service running on that system.

New!!: Hardening (computing) and Port (computer networking) · See more »

Position-independent code

In computing, position-independent code (PIC) or position-independent executable (PIE) is a body of machine code that, being placed somewhere in the primary memory, executes properly regardless of its absolute address.

New!!: Hardening (computing) and Position-independent code · See more »

Scripting language

A scripting or script language is a programming language that supports scripts: programs written for a special run-time environment that automate the execution of tasks that could alternatively be executed one-by-one by a human operator.

New!!: Hardening (computing) and Scripting language · See more »

Security-Enhanced Linux

Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including United States Department of Defense–style mandatory access controls (MAC).

New!!: Hardening (computing) and Security-Enhanced Linux · See more »

Security-focused operating system

This is a list of operating systems with a sharp security focus.

New!!: Hardening (computing) and Security-focused operating system · See more »

Solaris (operating system)

Solaris is a Unix operating system originally developed by Sun Microsystems.

New!!: Hardening (computing) and Solaris (operating system) · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Hardening (computing) and Unix · See more »

User (computing)

A user is a person who utilizes a computer or network service.

New!!: Hardening (computing) and User (computing) · See more »

References

[1] https://en.wikipedia.org/wiki/Hardening_(computing)

OutgoingIncoming
Hey! We are on Facebook now! »