Home > Cybersecurity glossary > Hardening 🟒 Protection

Hardening 🟒 Protection

Action to strengthen the security of an information system in order to prevent further intrusion by an attacker.

 

Examples of toughening measures

    • Updating software and operating systems install the latest security updates to correct any vulnerabilities. vulnerabilities known.
    • Secure configuration Modify the default settings of systems and software to make them less vulnerable to attack.
    • Access control Restricting access to sensitive systems and data to authorised personnel only.
    • Use of strong passwords Create complex, unique passwords for each account.
    • Regular back-ups Regular back-ups of important data so that it can be restored in the event of an attack.
    • Staff training Raising staff awareness of good safety practices and potential risks.
    • Surveillance and intrusion detection Monitoring: setting up monitoring systems to detect suspicious activities and attacks in progress.

Hardening tools

    • Firewalls to filter network traffic.
    • Antivirus to detect and remove malware.
    • Intrusion detection systems (IDS) to monitor suspicious activity.
Towards the ORSYS Cyber Academy: a free space dedicated to cybersecurity