Running Head : Information Technology- Server SecurityNameUniversityCourseTutorDateComputers serve a critical business office in many organizations today . rough organizations and companies read abanthrough and through and throughd manual register governances and intake estimatorized filing system of ruless to win efficiency and earnest of the information involved . certain(a) measures atomic hail 18 observed to stop hostage and protection of jakes informationDepartments within an organization should promote adherence to acceptable engage and trade protection of all computers . This hobo be make by setting up authentication and account management onward connecting o the web . This slew be done by ensuring that all accounts have reinforced passwords while administrative or root accounts are given even strong er passwords or passphrasesService is be as the work performed on behalf of a user or client program . Usually , work are practice by some set of software called server . invitee programs then connect to the server and request that work is done on their behalf ( HYPERLINK hypertext transfer protocol / entanglement .microsoft .com /technet /security /prodtech /windowsserver2003 /w2 003hg /sgch00 .mspx http /network .microsoft .com /technet /security /prodtech /windowsserver2003 /w20 03hg /sgch00 .mspx . Server can be defined as the software that performs a service . This software is often referred as daemon or service . Client can be defined as the software that uses the service digestd by a server . Server in an organization for eccentric university can be described as a common image at point for databases , data s , word process s and images where more than one individual can glide slope the serverSecurity annotation involves at least occasional care and keep Thi s whitethorn range from installation of new ! patches to the operating system to castrate the availability of go due to changing role of a computer or an organization . Change in engineering is inevitable and a continuous process , therefore computer security model must adapt with these changesOperating system should be protected by following certain guidelines which have been proposed by Microsoft Company . Microsoft has also proposed security of computer .
This involves instalment an set aside efficient anti-virus , putting a strong password to lift non authorized members from accessing information . Te computers should be scanned regularly for example after every two weeks to command that there are no threats . However , computers that are in a network and are connected to the internet should be scanned daily to ensure maximum security HYPERLINK http /www .microsoft .com /technet /security /prodtech /windowsserver2003 /w2 003hg /sgch00 .mspx http /www .microsoft .com /technet /security /prodtech /windowsserver2003 /w20 03hg /sgch00 .mspxSecure data should be deleted to enhance security of both the server and other computers that are connected through a network . Each computer should only deliver the goods the services needed for its role in an organization completely installed software should be configured and all unused features deepen to enhance security of the computer . Telnet and FTP should be incapacitate and SSH enabled instead . There should be restriction of access to services to only U of M addresses where necessary . i .e . go under access to databases to specific IP . addresses or U of M addresses...If you want to get a full essay, state it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment