| 4. Operating System: |
| 1. Hardening means that expert hackers must not be able to gain access via a vulnerability. |
| 2. Remove and disable most services such as printing - very few services are actually needed to do one job. |
| 3. Close all ports and open just the port that is needed. |
| 4. Enable SSH secure working but change its port from 22 to some random port like 1234. |
| 5. Disable remote root access. |
| 6. Disable all other users except the one approved (Eliza) user. |
| 7. Prevent all configuration files from being changed by any other user. |
| 8. Enforce security on all services - nothing changes - patches are disabled. |