Security - SSH/firewall/VPN
Last updated
Was this helpful?
Last updated
Was this helpful?
private key is kept secret and secure by the user
public key can be shared with anyone.
Password - you can try to get correct one.
SSH - have many more bits of data, and it is harder to guess.
Prevent man-in-the-middle attacks
discovering what services are running on the servers in your infrastructure.
Stay attention to are Proto
, Local Address
, and PID/Program name
.
If the address is 0.0.0.0
, then the service is accepting connections on all interfaces.
File auditing = detect changes to the system that may have been authorized.
IDS monitors a system or network for unauthorized activity.
Separating your components can limit the access that an intruder has to other pieces of your infrastructure.