Week 2 Secure Network

Submitted by: Submitted by

Views: 258

Words: 579

Pages: 3

Category: Science and Technology

Date Submitted: 05/23/2013 09:40 PM

Report This Essay

Securing Network databases

Joshua P. Esponge

Devry University

Professor: Sherry Desbrough

As an information security officer, I have to make sure the management understands it is critical to secure the UNIX/Linux and Windows Server against known shortcomings and vulnerabilities. It is wise to upgrade current security procedures to provide a better plan to secure the servers. We definite don’t want the operation terminated due to a server crash down because it was attacked by virus. Below I will list some of the important areas to better secure the servers.

The company have to enforce the policy on authorize user only with their system and servers. It is personal responsibility to ensure proper password installed and not share with others. People usually pick weak password because it is easy to remember or share the password between co-worker s are some of the major problems exit. “Many threats against data and resources are possible because of mistakes either bugs in operating system and server software that create exploitable vulnerabilities, or errors made by end users and administrators.” (National institute of standard and technology, SP 800-123, 2-1) Solutions are recommending information security awareness course within, teach employees how to protect the system and understand all the risks factors. Use CAC card reader, user account control can also identify the authorize using of the system.

The company must set policies to ensure unauthorized access to network at minimum. People use to surf online and downloading software without IT section authorization, the network can be traced and information can be easily leak out because people unaware of their doings, limited online access such as putting filters and access code can be effective to stop employee use working time to do personal entertainment. Also there are network tools available now to monitor computer activities during working hour to ensure proper use...