The ways to improve the security of your computer
1. Deploying Antivirus Software
- To prevent unauthorized access and to support authorized access.
- When selecting an antivirus software, look for the following:
- The product should originate from a well-known, reputable company.
- The product should automatically update its virus definitions.
- The product should scan stored files, memory (RAM), removable media, e-mail, and Web-transmitted data.
- The product should clean or quarantine any infected files it detects.
- Two elements are needed to gain access to a computer:
- Username :
- Most usernames are obvious or very easy to guess.
- Password :
3. Setting Access Permissions
- Passwords must be very strong and kept secured to maintain control over access.
- minimum required length (eight characters)
- Who creates the password?
- users create their own passwords is usually the best option
- Forced changing of passwords
- Administrators can use operating system features to make users change their passwords.
- Password length and complexity
- Controlling access is an important element in maintaining system security.
- The most secure environments follow the “least privileged” principle.
- This principle states that users are granted the least amount of access possible that still enables them to complete their required work tasks.
- Expansions to that access are carefully considered before being implemented.
4. Disabling File and Print Sharing
- On most networks where security is important, this service is disabled on all clients.
- This action forces all shared resources to be stored on network servers, which typically have better security and access controls than end-user client systems.
5. Using Network Address Translation (NAT)
6. Deploying a Firewall
- (NAT) is a feature of many firewalls, proxies, and routing-capable systems.
- NAT has several benefits:
- ability to hide the IP address and network design of the internal network.
- NAT enables internal clients to use non-routable IP addresses, such as the private IP addresses.
- NAT restricts traffic flow so that only traffic requested or initiated by an internal client can cross the NAT system from external networks.
7. Disabling Unneeded Services
- A firewall is a device or a software product whose primary purpose is to filter traffic crossing the boundaries of a network.
- That boundary can be a broadband connection, a dialup link, or some type of LAN or WAN connection.
- There are several types of firewalls or filtering mechanisms available to handle this job: packet filters,stateful inspection systems,proxy systems and circuit-level filtering.
8. Configuring System Auditing
- One of the primary tenets for maintaining physical security in a residence or business property is to reduce the number of pathways an intruder can take to gain access to it.
- Administrators should apply the same perspective in regard to the electronic pathways into the network.
- Any means by which valid data can reach the network or computer is also a potential path for a malicious intruder or attack.
- Systems linked to the Internet should have any unneeded protocols, applications, and services either disabled or completely removed or uninstalled.
- The only way to know when your system has been breached or when an unsuccessful attempt to penetrate your security has occurred is to monitor or audit for unusual or abnormal activity.
The ways to improve the security of your computer
Reviewed by Unknown
on
6:45 PM
Rating:
No comments: