Sie sind auf Seite 1von 3

MAHARAJA SURAJMAL INSTITUTE OF TECHNOLOGY

JANAKPURI, NEW DELHI

Name of the Students –


Enrollment No. –
Email /Phone No. –
Branch –
Name of the Project – SAT (System Auditing Tool)
INTRODUCTION

Most computers offer network security features to limit outside access to the system. Software
such as antivirus programs and spyware blockers prevent malicious software from running on the
machine. Yet, even with these security measures in place, computers are often still vulnerable to
outside access. Operating System hardening, helps minimize these security vulnerabilities.

The purpose of system hardening is to eliminate as many security risks as possible. This is
typically done by removing all non-essential software programs and utilities from the computer.
While these programs may offer useful features to the user, if they provide "back-door" access to
the system, they must be removed during system hardening.

Advanced system hardening may involve reformatting the hard disk and only installing the bare
necessities that the computer needs to function. The CD drive is listed as the first boot device,
which enables the computer to start from a CD or DVD if needed. File and print sharing are
turned off if not absolutely necessary and TCP/IP is often the only protocol installed. The guest
account is disabled, the administrator account is renamed, and secure passwords are created for
all user logins. Auditing is enabled to monitor unauthorized access attempts.

While these steps are often part of operating system hardening, system administrators may
choose to perform other tasks that boost system security.

OBJECTIVE

1) Security auditing - a systematic evaluation of the security of an operating system or web


server by measuring how well it conforms to a set of established criteria.

2) System hardening - providing various means of protection in a computer system.


Protection is provided in various layers and is often referred to as defense in depth.
Protecting in layers means to protect at the host level, the application level, the operating
system level, the user level, the physical level and all the sublevels in between.
SCOPE
Attack surface reduction: SAT use service configurations to remove all those components, that
are often activated for legacy compatibility or simplified setups. Some default configurations
these days already cover good security practices. SAT make sure to deactivate all application
modules, which aren't usually required.

Regular Checkup: SAT will keep Linux as well as all the important softwares up to date. It will
do a regular check of the available updates of softwares and automatically update them with
users permission.

Core components: SAT will take care of Anything from the basic operating system to well
known web servers. SAT will maintain these common building blocks to be at their optimal
configuration and avoid repeated mistakes.

TECHNOLOGY
SAT is build using 2 technologies -
1. Python
2. Bash Scripting

BIBLIOGRAPHY
Linux Command Line and Shell Scripting Bible, 3rd Edition By Richard Blum, Christine
Bresnahan
https://linuxjourney.com/
https://www.cisecurity.org/cis-benchmarks/
https://www.python.org/
https://www.udemy.com/bash-scripting/

Das könnte Ihnen auch gefallen