Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 242
  • Last Modified:

Web portal security tool

What is the best tools available to block hacker or cracker from accessing the web portal running on Linux Platform. Any sites or resources available ?

0
philipteh
Asked:
philipteh
1 Solution
 
biraCommented:

  Hi
     The best way is to use a firewall.
     you can find a lot of sites about it by searching
     the internet.  search in www.altavista.com
0
 
ahoffmannCommented:
there is no "best tool"
It all depends on your requirements and your precautions.

Some more info on what you want to archive would help to give you more detailed answers.
0
 
vinnyd79Commented:
I haven't tried it,but Ive heard this works well:

http://www.portsentry.com/products/portsentry.html
0
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

 
chris_calabreseCommented:
There are several issues here, each of which has several possible solutions

1.  Keeping attackers from accessing/attacking network services.  Solutions in this space are network firewalls, host firewalls (portsentry, IPtables, etc), and host hardening (Bastille Linux is your best bet here - http://bastille-linux.sourceforge.net/).
2.  Keeping attackers from attacking vulnerabilities in the web server software.  Solutions here include using web server software with a strong security track record, keeping up to date on web server patches, and possibly using application aware firewalls that try to detect/block HTTP-level attacks (such as Sanctum AppSheild, KaVaDo InterDo, or the HTTP-aware logic in firewalls from CheckPoint, Cisco, Symantec, and SecureComputing).
3.  Keeping attackers from attacking vulnerabilities in the scripting/CGI software you're using.  Solutions here are similar to those for #2.
4.  Reducing the damage if an attacker actually does break in.  This is a pretty broad topic, but most solutions revolve around host hardening, using a DMZ architecture to make it harder for the attacker to attack other servers in your infrastructure, and limiting trust relationships between servers.
5.  Detecting whether an attack has actually occured so you can react properly.  Solutions here include filesystem integrity checkers (such as Tripwire), host-based intrusion detection systems (such as LIDS), and network-based intrusion detection systems (such as SNORT).
5.
0
 
gandalf94305Commented:
Generally, I would recommend a firewall or at least a port-filtering router. The router solution will probably be cheaper and still sufficient. Use an external component, not a firewall on the Linux system.

--gandalf.
0
 
tfewsterCommented:
No comment has been added lately, so it's time to clean up this Topic Area.
I will leave a recommendation for this question in the Cleanup topic area as follows:

- Answered by chris_calabrese

Please leave any comments here within the next 7 days

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

tfewster
Cleanup Volunteer
0
 
SpideyModCommented:
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now