Wednesday, August 28, 2019
Network security Essay Example | Topics and Well Written Essays - 1500 words - 1
Network security - Essay Example As far as the computer hardware compatibility list (HCL) is concerned the peripherals must be compatible with the operating systems. The HCL may be centrally controlled and user driven. An official HCL should be available on the website of the operating system. The Linux operating system provides the best HCLs (http://www.linuxquestions.org/hcl). Microsoft windows provide the HCL access to average users also due to their market dominance (http://www.microsoft.com/whdc/hcl/) However network security policies aim at the protection of network and related accessible resources from unauthorized users. The administrators ensure the continuous monitoring and effective implementation of the security measures. In order to have a checklist in mind for fool proof security stem in the networking an example of defense of a house from thieves can help. The network attached storage helps the interconnected PCs from hacking and viruses. In this way the attacks at entry level are prevented when the alerts go through the whole network. The computer host security network is not dependable as the hackers can have access and can purchase the hosts rather more easily. The net work security checklist includes the authorization and authentication of the user, creation of firewall for filtering the allowed services to the user, provision of the intrusion prevention system, monitoring for suspected traffics, and denial of unauthorized service (Duane DeCapite, Cisco Press, and Sep. 8, 2006). Depending on the size of the users, software for Antivirus likes Norton or McAfee etc are used. The bigger businesses use the security analyzers in addition to firewalls. And physical security checks against viruses and security fencing. In the UNIX operating environment the script files are created by using screen capture commands. This means that the user is trying to capture the interaction between the text file and UNIX operating system. Such a text file is called a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.