How to maintain the website server

1. Introduction
  During the operation of the website, it may be subject to malicious attacks on the network, which is not conducive to the long-term development of the website. These malicious attacks mainly include the following two types. One is various network attacks including network viruses, which occupy a large amount of server resources, make the server run slowly, and cause the server to be paralyzed in severe cases. The other is a malicious intrusion by man, stealing important information in the server and causing damage to the server. Therefore, if you want to improve the security of website operations, you must attach importance to server security maintenance and adopt correct maintenance techniques to ensure the normal operation of the website server.
  2. Think empathy and simulate attacks
  Under normal circumstances, we deal with problems from the perspective of website maintenance, and some server vulnerabilities are difficult to find. If we think differently, think from the perspective of an attacker, try to find vulnerabilities and carry out attacks, it will be easy to find the vulnerabilities of the website server and fix them. Visit the website server through the external network, conduct a comprehensive inspection, and simulate an attacker to carry out a malicious attack, which is an excellent server security inspection method. Using the attacker’s identity to simulate an attack and use the attacker’s technical means to scan the Wangchang server, we will find some vulnerabilities that we have not paid enough attention to but can be exploited by the attacker. In daily security maintenance, the staff generally do not care about this problem, but the way of empathy can easily find this security hole.
  3. Maintain permissions reasonably
  In a website server, in addition to running website services, it usually runs multiple network services including FTP server and streaming media server. Running multiple services on a server will cause them to infect each other. As long as one of the services is attacked, all other services on this server will be attacked. If you use multiple servers to run these different services, you can solve this problem. However, this will cause a waste of server resources. The server must be properly configured. Use one server to run website services, FTP services, and streaming at the same time. Media services, etc. are feasible and will not slow down the operation speed. However, this mode of operation brings greater difficulties to the security and maintenance of the server. When multiple services run on a server, how to avoid mutual infection is the key to ensuring operational safety. As we all know, there are two commonly used file storage systems, FAT and FAT32. NTFS is a disk format supported by the Microsoft Windows NT kernel series operating system, and is specially designed for network and disk quotas, file encryption and other management security features. In the NTFS file storage system, we can set individual access permissions to any disk partition, and store important information in multiple disk partitions. In this way, even if an attacker gains access to service files through technical means, he still needs to break through the security settings of the system to gain access to important information in other disk partitions. In order to achieve this, we can convert all hard disks in the web server to NTFS format partitions. Generally, NTFS formatted partitions are more secure than FAT formatted partitions. Using the function of NTFS format partition, different services can be assigned their own permissions. If you set up different maintenance accounts for the three services in the server, one account can only locate the specified directories and partitions. In this case, even if one of the maintenance accounts is stolen, the attacker only has access to the files and information of the service corresponding to this account, and cannot access other services. For example, we install the website service on the D drive and the FTP service on the E drive. If the FTP service account is attacked, leading to the leakage of important information, but because the FTP service account does not have the permission to access the D drive, it will not pose a security threat to the website services installed in the D drive, so as to ensure that the attacker is invading After the FTP service, it will not affect other services running on the server.
  4. Safe maintenance of running scripts
  In the actual security maintenance, we can find that most web servers are paralyzed due to attacks because of the use of bad scripts. Attackers generally prefer to attack PHP scripts or CGI programs. During operation, if you want to visit the website, you must pass a series of necessary parameters. These parameters mainly fall into the following two categories: one is trustworthy parameters, and the other is untrustworthy parameters. If the server of the website is maintained by yourself, you can choose to place the server in the firewall to improve the security of the server. Therefore, the parameters inside the firewall are basically reliable and belong to trustworthy parameters, and how can the unexpected parameters of the firewall be untrustworthy parameters. At that time, when setting up the web server, it was necessary to check the legitimacy of untrusted parameters, which could not be completely trusted. For example, if an attacker connects to port 80 of the server, he can pass insecure parameters to the CGL script through this port. Therefore, when editing PHP scripts or CGI scripts, you should avoid arbitrarily receiving parameters passed by others. If you must accept them, you should check the legitimacy of the parameters and the provider. In the script program, you can set the judgment conditions. When the parameters are inaccurate, the maintenance personnel should be notified in time for appropriate defense.
  5.
  Take the backup and protection of the operating system as an example to improve the security of the website server operating system. The following aspects must be done: First, the operating system should be backed up regularly to facilitate the timely recovery of the system in case of an attack. normal operation. Second, install anti-virus software and firewall software for the operating system, add software protection on the basis of hardware defense, and improve the level of security protection. Finally, open the event log. Although enabling logs will not play a substantial role in preventing malicious attacks, we can obtain the whereabouts of attackers through practice logs. Maintainers can use the logs to determine their activities and the damage or hidden dangers that will cause the system to deal with these Take corresponding measures to deal with the problem.
  6. Concluding remarks
  To sum up, the security maintenance of the website server is a very important task. Only by doing this well can the website be operated safely and stably. Therefore, we must master more maintenance skills and apply them reasonably at work to improve the security of the website server.

Guess you like

Origin blog.csdn.net/meiya9999/article/details/108660022