Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
btkb:start [2022/01/07 00:45] – seb | btkb:start [2022/01/07 01:41] (current) – seb | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Blue Team Knowledge Base ====== | ====== Blue Team Knowledge Base ====== | ||
Blue Team members are the defenders of computer networks and systems. Below you shall find practical security guides, written to help you secure your networks and systems, and longer articles covering the theory of Cyber Defense (i.e. Cybersecurity Frameworks). | Blue Team members are the defenders of computer networks and systems. Below you shall find practical security guides, written to help you secure your networks and systems, and longer articles covering the theory of Cyber Defense (i.e. Cybersecurity Frameworks). | ||
+ | |||
+ | ---- | ||
===== Practical Guides ===== | ===== Practical Guides ===== | ||
==== Desktop Security ==== | ==== Desktop Security ==== | ||
+ | |||
+ | === General Guidelines for Desktops === | ||
+ | * Use an OS that is still supported by the vendor and receives security updates regularly. | ||
+ | * Install security updates at least monthly. | ||
+ | * Use a reasonably [[btkb: | ||
+ | * Enable the [[btkb: | ||
+ | * Install an [[btkb: | ||
+ | * Don't use the computer with administrative privileges. | ||
+ | * If the device is mobile (laptops), [[btkb: | ||
+ | |||
+ | === Security Guides for Desktop OS === | ||
* [[btkb: | * [[btkb: | ||
* [[btkb: | * [[btkb: | ||
* [[btkb: | * [[btkb: | ||
+ | |||
+ | === Advanced Desktop Security === | ||
+ | * [[btkb: | ||
+ | * [[btkb: | ||
+ | |||
+ | ---- | ||
==== Server Security ==== | ==== Server Security ==== | ||
- | === General | + | |
+ | === General | ||
* Use an OS that is still supported by the vendor and receives security updates regularly. | * Use an OS that is still supported by the vendor and receives security updates regularly. | ||
* Only install software that is actually needed for the specific role of the server. | * Only install software that is actually needed for the specific role of the server. | ||
* Patch all software on the server at least monthly. | * Patch all software on the server at least monthly. | ||
- | * Enable the host firewall that comes with the server' | + | * Enable the [[btkb: |
* Change all default password to complex and long passwords. | * Change all default password to complex and long passwords. | ||
Line 20: | Line 40: | ||
* [[btkb: | * [[btkb: | ||
* [[btkb: | * [[btkb: | ||
+ | |||
+ | ---- | ||
===== Theory of Cyber Defense ===== | ===== Theory of Cyber Defense ===== | ||
* [[btkb: | * [[btkb: | ||
+ | ---- | ||
+ | |||
+ | ~~DISCUSSION~~ |