تبلیغات
اگر تنهاترین تنهایان شوم باز هم خدا هست - security
جمعه 19 فروردین 1390  12:45 ب.ظ    ویرایش: - -

IT Administrator should know about all the possible security attacks and also know their solutions. IT Administrator should look for the viruses from the Internet, Malware, Adware, Trojan horses, E-mail attachments, Floppy disk, CD or any infected computer that is attached to the network. Spyware and network intrusions are specifically designed to get the secret information from their target companies, which can do harm for the company. Everyday security threats are refined as hackers designed new security threats.

The main cause of a security threat in the small companies is the misuse of the internet without proper anti virus, anti spyware installed on the every PC of the company’s network. For example if a company’s employees browse an inappropriate website, sends or receives the infected data, leaks company’s secret information, then there are greater chances for a possible virus/malware attack.

 

In my opinion, the end user’s education on the security threats, preventions and precautionary measures are must. They should be trained about the possible and easy virus attacks from the internet if they browse the inappropriate sites.

Another important thing is the insider’s attack e.g if the company’s employee leave the company for any reason, then its very important that all the computer and other company’s sensitive assets access should be revoked by him immediately. I have personally seen a situation, when a company’s network administrator was dismissed and he access the company’s server by VPN and send harmful viruses to the server and the entire computer network, and it was impossible for the IT manager to control all the security attacks in one time.

It’s the responsibility to keep a closer eye on the new employee’s activities, their access to the sensitive data, and computers servers. IT managers should bring it in the knowledge of the employees that any change in their computer will be logged. So that nobody can even try to do anything that is not permitted.

There are six basic security steps for the Windows platforms. If a network administrator can follow these steps then he/she can save the computerss from all the possible security threats and virus or malware attacks.

First the IT managers should divide the computer network into the segments. They should filter the access to the internet with the help of a firewall by blocking TCP port 1433 and TCP port 1434. Internet access from the outside should be allowed to the SQL systems. All the unwanted ports should be blocked and only the required ports should be open for access.

Second, moderate the affect of the spoofed ports. The port 80 is the most commonly used port.

Third, as network administrator you should install the current patches to you’re your server computer and client’s up to date. Patches can prevent the systems from the known vulnerabilities. Latest patches can be downloaded from the Windows website. You can also configure to automatically update. Also third party patches products are also available that can be tested and installed. Additionally, by strengthening the user authentication process can be very helpful for security purposes.. You can use password security and other technological methods for the authenticate purpose.

Fourth, you can limit the number of the network administrators it can also be helpful for security a computer network. Admin rights should not be given to the local PC, until and unless it is the requirements for the applications that are installed on the local PCs.

Fifth, protect computers against the known attacks. Don’t disable any Windows known service such as clipbook, Telnet etc. Set the powerful permission the shared network resources.
Last, you can configure the security policies. Implement the security policies on your network.
Security measures and methods have expenses with their purchases. Deployment, maintenance and the implementations of these methods can increase the security cost. Some other things which a IT administrator or a IT manager should keep in mind are the education of the employees about the computer networking, security, use of the encryption and digital right management software, block the unwanted emails and audit security on the regular basis. Network security methods should be used and implemented in order to prevent your computer network from the unauthorized access.

In this article you have discovered the Computer Network Security Overview More topics to come are Cisco Labs, Routing, IP addressing & Free IT resources.

   


نظرات()  
feet complaints
شنبه 25 شهریور 1396 08:26 ب.ظ
Hi, i think that i saw you visited my site so i came
to “return the favor”.I am attempting to find
things to improve my web site!I suppose its ok to use a few of your
ideas!!
Foot Issues
دوشنبه 16 مرداد 1396 12:39 ب.ظ
I really like it when folks come together and share views.
Great site, stick with it!
How can you heal an Achilles tendonitis fast?
شنبه 14 مرداد 1396 06:31 ق.ظ
Right now it looks like Wordpress is the preferred blogging platform available right now.

(from what I've read) Is that what you are using on your blog?
ladonnastrupp.hatenablog.com
سه شنبه 10 مرداد 1396 03:58 ق.ظ
Hey, I think your site might be having browser compatibility issues.
When I look at your blog in Safari, it looks fine but when opening in Internet
Explorer, it has some overlapping. I just wanted to give you
a quick heads up! Other then that, fantastic blog!
 
لبخندناراحتچشمک
نیشخندبغلسوال
قلبخجالتزبان
ماچتعجبعصبانی
عینکشیطانگریه
خندهقهقههخداحافظ
سبزقهرهورا
دستگلتفکر

اگر تنهاترین تنهایان شوم باز هم خدا هست

مــتـنــفــرم از خــاطــره هـــایــی کــه وقــتــی بــهـــشــون فــکــر مــی کــنــم ، مــیــگـــم: وای مـــن چــقـــدر احــ