Security Recommendations
Essay by Paul • February 18, 2012 • Essay • 408 Words (2 Pages) • 1,299 Views
Security Recommendations
As Questionable Designs, Inc. makes the transition to Linux using only the Red Hat Enterprise Linux (RHEL) platform, considering the security of the systems are critical to the organization moving forward successfully and smoothly. The design of RHEL is by and for the most security-conscious organizations in the world. By having the right tools, vigilance, and administrative knowledge, systems running RHEL are secure from common exploit and intrusion methods while remaining fully functional.
Workstation Security
Securing Questionable Designs, Inc. system should start with the workstations. Considerations for how to secure Questionable Design, Inc.'s workstations should include password security, administrative controls, firewalls, and security enhanced communication tools. Red Hat can handle this because it has developed a layered defense scheme for keeping desktops and workstations secure that includes more secure applications and smartcard authentication support (Red Hat, Inc., 2011).
To address the situation of configuring a firewall for workstations, RHEL comes with two graphical firewall configuration tools. These tools are known as the GNOME Lokkit and Security Level Configuration Tool. The GNOME Lokkit uses a wizard-type interface to ask the user a series of questions and the Security Level Configuration Tool is a firewall control panel (Red Hat Security Guide, n.d.).
RHEL also comes with tools to minimize the threat of communication interception. The first tool is OpenSSH, which is a protocol for encrypting communication over the organization's network. The second tool is Gnu Privacy Guard, which is a free version of the Pretty Good Privacy encryption application for encrypting data (Red Hat Security Guide., n.d.).
Server Security
Questionable Designs, Inc.'s server security is extremely important because servers hold much of the organization's important data. A compromised server could leave Questionable Designs Inc. vulnerable to attack by hackers to steal or manipulate the server's contents as they please. Considerations for server security should include making sure services are up-to-date, use only secure protocols, and monitoring servers for suspicious activity.
With RHEL, Questionable Designs Inc. would be able to deploy solutions with confidence because Red Hat comes equipped with fully certified software applications and hardware the organization would use. Red Hat Linux server is backed by the support Questionable Designs Inc. would need because support for Red Hat releases last at least seven years. By using a Red Hat dedicated Linux server Questionable Designs Inc. would receive the latest security errata and bug fixes because Red Hat has its own network for automated software updates and delivery (Red Hat Security Guide, n.d.).
...
...