# System Admin ### How do you change your DNS settings in Linux/Windows? Windows: Internet adapter/ Linux: sudo nano /etc/resolv.conf add nameserver x.x.x.x ### Cyber Crime vs Cyber-enabled crime Cyber-enabled crime: traditional crime that is amplified by the use of computer tech Cyber Crime: illegal action involving network or computer where it used to commit the crime ### What is the main goal of information security within an organization or company? Protect CIA (Confidentiality, Integrity, Availability) ### What are the consequences of a cyber-attack? ### First step of securing Linux Server Auditing: A system scan is performed using a tool called Lynis for auditing. Every category is scanned separately and the hardening index is provided to the auditor for further steps. Hardening: After the audit is complete, the system is hardened depending on the level of security it further needs. It is an important process based on the decision of auditor. Compliance: The system needs to be checked almost every day for better results and also lesser threats from security point of view. ### How to secure a Web Server - Anti-virus and firewalls - Safe installation and configuration of the web server software - Secure installation and configuration of the O.S - Scanning system vulnerability - Remote administration disabling - Removing of unused and default account - Changing of default ports and settings to customs port and settings - Update/Patch the web server software - Update Permissions/Ownership of files - Delete default data/scripts - Remove or protect hidden files and directories - Web Application and Web Server Security - Minimize the server functionality disable extra modules - Increase logging verboseness - Configured to display generic error messages - Make sure Input Validation is enforced within the code: Security QA testing - Implement a software security policy