Skip to main content

Server Security

Operating Systems

The security of an application is ultimately only as good as the security of the operating system on which it is running, some operating systems being simply more immune to attack than others.

All operating systems have vulnerabilities, and, as they are discovered and published to the industry, it is essential to apply updates to the operating systems to ensure that all known weaknesses are eliminated. BluBØX monitors all of the major security advisories and makes a practice of constantly updating its server operating systems with the safest available software.

Web and Application Servers

Web servers are vulnerable to a variety of attacks. Some of these will disable the server, while others may allow hackers to gain access to the operating system of the server itself, which then provides a beach-head for further malicious activities within the network under attack.

Due to their internal architecture, the web servers used in the data center are not vulnerable to many of the common types of attacks such as buffer overflows and malformed strings. This is largely due to the fact that they are based on the Java programming language, which has built-in safeguards against such errors. 

Database Server

The database server is a highly protected resource which is separated from all other server resources. There are no unnecessary services running on the database server, which severely restricts the options for accessing the system at the operating system level or with direct connections to the database itself.

  • Was this article helpful?