Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Ubuntu Server

You're reading from   Mastering Ubuntu Server Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04

Arrow left icon
Product type Paperback
Published in May 2018
Publisher Packt
ISBN-13 9781788997560
Length 552 pages
Edition 2nd Edition
Concepts
Arrow right icon
Author (1):
Arrow left icon
Jay LaCroix Jay LaCroix
Author Profile Icon Jay LaCroix
Jay LaCroix
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Preface 1. Deploying Ubuntu Server 2. Managing Users FREE CHAPTER 3. Managing Storage Volumes 4. Connecting to Networks 5. Managing Software Packages 6. Controlling and Monitoring Processes 7. Setting Up Network Services 8. Sharing and Transferring Files 9. Managing Databases 10. Serving Web Content 11. Learning Advanced Shell Techniques 12. Virtualization 13. Running Containers 14. Automating Server Configuration with Ansible 15. Securing Your Server 16. Troubleshooting Ubuntu Servers 17. Preventing and Recovering from Disasters 18. Using the Alternate Installer 19. Assessments 20. Other Books You May Enjoy

Summary

In this chapter, we looked at the ways in which we can harden the security of our server. A single chapter or book can never give you an all-inclusive list of all the security settings you can possibly configure, but the examples we worked through in this chapter are a great starting point. Along the way, we looked at the concepts of lowering your attack surface, as well as the principle of least privilege. We also looked into securing OpenSSH, which is a common service that many attackers will attempt to use in their favor. We also looked into Fail2ban, which is a handy daemon that can block other nodes when there are a certain number of authentication failures. We also discussed configuring our firewall, using the Uncomplicated Firewall (UFW) utility. Since data theft is also unfortunately common, we covered encrypting our backup disks.

In the next chapter, we'll...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image