A system administrator is generally expected to know about installation and configuration of the operating system. Linux course enables a candidate with the power of configuring static route; packet filtering and network address translation. An able Sys admin can perform some maintenance task using shell scripting. As a system admin you have the knowledge of setting kernel runtime parameters. It is only when you target for becoming a certified engineer, the Linux course makes you capable of dealing with the advanced and improvised topic of security. So if you want to climb the staircase faster, it is always advisable to know the improvised topic of security.
Five Security Tips for New Linux Admins
As a new Linux admin you should always remember the following security tips so that you can easily sort out various issues cropping up while working and keep your system secure and protected. These are the basics which you should never forget.
* Need a regular user account: It is always advisable to create a regular user account to do your work. As a system admin, you have to do few tasks as a root user, but make sure that you never forget to type “exit” when your work is over. You can also take the assistance of ‘sudo’ that will always ask for authentication as root user after a time period. You can do your normal and regular work as a non-administrative user. Use your root account when required and not always.
* Patch your system: You should always keep your system patched as it is really very easy to ‘pwn’ any unpatched operating systems. Every element of software that has been written is vulnerable at some point or the other. So it is always better to use openSUSE’s package management, Zypper, to check whether your system is patched. If you just update your system, your work is done, but to ensure more security sometimes do visit the patch level.
* Disable the services: Make sure to go through the packages that are installed on your system to find out what you do not need. Uninstall everything you do not need for your work. Getting rid of such unused services will ensure more security.
* Ports are vulnerable: If you know the use of tools like Nmap or something related, you can use them for scanning the vulnerability of the port. To ensure security, always update yourself with the distribution’s commands and use them for managing the ports. As the ports open itself on the external networking system, they are the target of the hackers. It is better to shut down any port that is unused.
* SELinux is an added security: Learning to use SELinux is always a boon. It may cause initial hiccups, but once configured it has lots of benefits. It gives you control over your users and their activities with files and programs. For some distribution it is installed by default and for some it is an add-on option. So if it is installed do not disable SELinux.
Taking backups for everything can keep all your data secure and safe and you will never face any problem as a new System Administrator. Smart System Admin learns security ropes as early as possible.