A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

What is Hardening?

 , updated on
Hardening is the process of identifying and securing information security vulnerabilities. It occurs both as an internal process of security testing and as a result of being exposed to information security attacks.

Security Testing

Information security testing aims to identify and reduce vulnerabilities in user interfaces, communication endpoints, APIs and services with secure code reviews, vulnerability scans, penetration tests and security audits. The goal is to close as many vulnerabilities as possible before shipping code.

Public Hardening

Code that has been exposed to networks such as the internet tends to become hardened with time as it faces public scrutiny and security attacks. For example, a release of linux used on hundreds of thousands of internet servers for many years would generally be considered more hardened than a new operating system that has just been launched. This is assuming that someone is fixing vulnerabilities when they are found.

Open Source vs Closed Source

Generally speaking, popular open source software has a hardening advantage over closed source software. Being able to view source code initially gives attackers a major advantage that quickly leads to hardening of code.
Overview: Hardening
Type
Definition
The process of identifying and fixing security vulnerabilities by opening technology to scrutiny and attack.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Robotics vs Artificial Intelligence

The different between robots and AI.

Vertical Farming

An overview of vertical farming.

Superintelligence

An overview of superintelligence.

Dyson Sphere

An overview of Dyson spheres.

Yobibyte

A definition of yobibyte with a chart of comparisons to other data sizes.

Artificial Intelligence Examples

Common examples of artificial intelligence.

Speed Of Light

An overview of the speed of light with examples.

Technology Examples

The definition of technology with examples.

Technology Theory

A list of interesting technology theories.

Technology Change

An overview of technology change with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map