Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Mail Systems
Eclipse Documentation

How To Guides
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Problem Solutions
Privacy Policy




Chapter 4. Workstation Security

Securing a Linux environment begins with the workstation. Whether locking down a personal machine or securing an enterprise system, sound security policy begins with the individual computer. After all, a computer network is only as secure as its weakest node.

4.1. Evaluating Workstation Security

When evaluating the security of a Red Hat Enterprise Linux workstation, consider the following:

  • BIOS and Boot Loader Security — Can an unauthorized user physically access the machine and boot into single user or rescue mode without a password?

  • Password Security — How secure are the user account passwords on the machine?

  • Administrative Controls — Who has an account on the system and how much administrative control do they have?

  • Available Network Services — What services are listening for requests from the network and should they be running at all?

  • Personal Firewalls — What type of firewall, if any, is necessary?

  • Security Enhanced Communication Tools — Which tools should be used to communicate between workstations and which should be avoided?

  Published under the terms of the GNU General Public License Design by Interspire