Windows Security

Submitted by: Submitted by

Views: 102

Words: 301

Pages: 2

Category: Science and Technology

Date Submitted: 08/24/2014 10:09 AM

Report This Essay

It is important to secure Windows and Linux servers against known shortcomings because these are the routes most hackers will follow and abuse during a potential attack. These shortcomings are well known to the attackers and are often key parts of their attacks. Security threats can have very costly consequences because they have a potential to effect sales, public opinion and customer confidence. Because of this fastidiousness must be maintained to ensure the protection of key systems thus mitigating potential security threats.

Steps that can be taken to increase infrastructure security include constantly improving and updating a security plan that includes technological securities such as firewalls, port blockers and anti-viruses and physical securities include locking office doors, and increasing the complexity required for user passwords. The five key aspects of IT security include policy, access, and audit management as well as hardware security and incident response. Policy management or the strategies a company uses to combat potential security risks is an essential step in ensuring IT security. Access management is the process of providing authorized users access to sensitive documents and restricting the access of unauthorized users. Audit management is the ability of a security team to be able to detect and understand potential security threats. Hardware security includes protection of the physical aspects of the computer. A person can easily open up an unsecured system and remove hard drives containing sensitive information. Incident response is the process of responding quickly and efficiently to potential risks.

It is important to secure windows and Linux against common shortcomings because these methods are well known to attackers and often provide them with optimal advantages during an attack. It’s better to spend money now to combat potential risks then to spend more money later after an attack has damaged a company’s reputation.