Preview

secure computing environment

Satisfactory Essays
Open Document
Open Document
433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
secure computing environment
A secure computing environment is having a system in place that controls the storage and use of information. A secure environment is used to defend against personal or confidential information. Network security can be classified as an function that intended to protect the network assuring safety, reliability and integrity of information.
Locking the authorization level assist in keeping the server safe. Setting wrong permissions on the files present in the server may lead to data leaking. To avoid access to outside users into the server usage of open permissions must be avoided by locking the permission levels.
Using integrity checker is very vital for secure environment. It alerts when any changes are made in the information by the hackers. Without an integrity checker it may go unnoticed and finally leading to disaster loosing the original contents of the files.
Changing the password regularly is an important practice to keep the information secure. If passwords such as e-mail passwords, software admin passwords and control panel password are not changed for a longer time or using the same password for multiple items the chances are high for a hacker to capture the data.
The server logs such as traffic logs, file integrity checker logs and access logs must be reviewed periodically as it helps in monitoring any attempts of hacking so that necessary steps can be taken to permanently block the hackers and thereby keeping the server secure.
It is important to perform backups on the server on regular intervals to avoid difficulties in situation such as server failure due to hardware of software failure. By performing regular backups, server integrity can be maintained.
Usage of Firewall and Proxy helps in protecting the computer network and increases the security by blocking unauthorized users to access and therefore which in turn maintains the business continuity.
USAGE OF INTRUSION PREVENTION SYSTEM:
It is done to effectively mitigate a wide range of

You May Also Find These Documents Helpful

  • Good Essays

    | Access control allows the network to prevent outside access that is unauthorized and really watch what is happening on the network.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the WAN domain, we need to make sure that all firewalls are set up on the network to filter all traffic. A firewall can stop all traffic coming on to our system that is not meant or not wanted on the network.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The reason why it is important to scheduled backups of data is because data to a business can be very important to them. This is why data should be backed up regularly to ensure data can recover easily also data in some business might change frequency so this is another reasons why it should be backup regularly.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are many was to secure a business either small or large. If synchronizing the servers between each other, this process will create a backup of all the data between the servers, as well for arranging an off-site backup location to protect any further loss or corruption.…

    • 268 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    307-Task B

    • 265 Words
    • 2 Pages

    Biv, If your files are stored on computer or other electronic device you should ensure it is password protected and that any removable devices are locked away securely. Usernames and Anti-virus programs also give you better protection. Anti-virus is only effective if you keep it up to…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    8. What is the PASS_MAX_DAYS setting? Why is it good to set this? Max days to change your password. This is a great idea to force people to change passwords and if they don’t then the account goes bye bye.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Stability and Reliability, it has been proven that data loss has occurred mostly in windows based operating system environments rather than opposed to UNIX / LINUX based environments.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays

Related Topics