Preview

secure computing environment

Satisfactory Essays
Open Document
Open Document
433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
secure computing environment
A secure computing environment is having a system in place that controls the storage and use of information. A secure environment is used to defend against personal or confidential information. Network security can be classified as an function that intended to protect the network assuring safety, reliability and integrity of information.
Locking the authorization level assist in keeping the server safe. Setting wrong permissions on the files present in the server may lead to data leaking. To avoid access to outside users into the server usage of open permissions must be avoided by locking the permission levels.
Using integrity checker is very vital for secure environment. It alerts when any changes are made in the information by the hackers. Without an integrity checker it may go unnoticed and finally leading to disaster loosing the original contents of the files.
Changing the password regularly is an important practice to keep the information secure. If passwords such as e-mail passwords, software admin passwords and control panel password are not changed for a longer time or using the same password for multiple items the chances are high for a hacker to capture the data.
The server logs such as traffic logs, file integrity checker logs and access logs must be reviewed periodically as it helps in monitoring any attempts of hacking so that necessary steps can be taken to permanently block the hackers and thereby keeping the server secure.
It is important to perform backups on the server on regular intervals to avoid difficulties in situation such as server failure due to hardware of software failure. By performing regular backups, server integrity can be maintained.
Usage of Firewall and Proxy helps in protecting the computer network and increases the security by blocking unauthorized users to access and therefore which in turn maintains the business continuity.
USAGE OF INTRUSION PREVENTION SYSTEM:
It is done to effectively mitigate a wide range of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * Data should constantly be tested to make sure there is no corruption or lost. The redundant servers should greatly help with this. When the data is taken off site there should be a working sever there to test the backup upon arrival. All checks should be logged.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1230 Unit Excer1

    • 313 Words
    • 2 Pages

    You can specify different password and account lockout policies for different sets of users. I believe this little bonus is quite big for most of the administrators.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By restricting user access, only allowing the user/employees enough access to successfully do and complete their job/tasks; you can prevent user destruction.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Another reason why we have to test the integrity of data that is backed up is to check for any human errors because you don’t want to be recovering the data and find out your missing half the data that was needed because this could lead to losing important data that makes the business lose money.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are many was to secure a business either small or large. If synchronizing the servers between each other, this process will create a backup of all the data between the servers, as well for arranging an off-site backup location to protect any further loss or corruption.…

    • 268 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    307-Task B

    • 265 Words
    • 2 Pages

    Biv, If your files are stored on computer or other electronic device you should ensure it is password protected and that any removable devices are locked away securely. Usernames and Anti-virus programs also give you better protection. Anti-virus is only effective if you keep it up to…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    Break down admin responsabilities and only give them the access for what duties they need to perform. PAM command is a great idea in this scenereo.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Stability and Reliability, it has been proven that data loss has occurred mostly in windows based operating system environments rather than opposed to UNIX / LINUX based environments.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays

Related Topics