Principles of Information Security

Submitted by: Submitted by

Views: 47

Words: 625

Pages: 3

Category: Other Topics

Date Submitted: 02/15/2015 05:22 PM

Report This Essay

Week 2 Case Study

Forest Walton

SEC 280

1/18/2015

Introduction

Information security is a significant process that needs to be enhanced in any organization. Security is an important aspect that will need to be taken into consideration when undertaking any form of information system analysis. Security, more so for the windows and Linux servers is important to an organization.

Importance of securing windows and Linux servers

It is important to secure windows and Linux servers from any shortcomings. One of the reasons for the need to have security of these assets is the role they play in the organization. The servers are important to the operations and the processes that are done within the organization. In a normal day, the servers process a lot of requests from end users. Any abnormality or breaking of the two servers will affect service delivery (Stamp, 2011). Servers are important due to their issues when it comes to management of computing processes. Any attack that will affect the normal functioning of the servers will affect the rate at which the requests from users will be processed. It is for this case that there is a need to ensure that there is an understanding of the servers and that the environment that they operate should be as safe as possible.

Another reason is that the servers will affect all other hosts if they are attacked by malicious programs. The impact that the attacks will have on the servers will be severe if they are not secured. It is important to ensure that the servers and the management of the servers is up to task with the requirements of the organization. Many attacks which have affected entire organizations have come as a result of the attacks which are geared and directed at servers. Most of the cyber-attackers target the servers, which happen to be windows and Linux servers of the organizations. They are the most vulnerable in terms of attacks. Most of the attacks that are designed and targeted at organizations come as...