Sunday, June 9, 2019

Security Analysis and Redesign of a Network Essay

Security Analysis and Redesign of a Network - Essay ExampleService Information direct System Linux 2.5.25 - 2.6.3 or Gentoo 1.2 Linux 2.4.19 rc1-rc7. Interesting ports on XYZ Invite Design at domain 192.168.0.6 Nmap done 6 IP address (6 hosts up) scanned in 64.27 seconds.Password strengths atomic number 18 essential in security matters. Users password must be encrypted so as to prevent unauthorized entries to the system (Stewart, 2010). The Public Key Infrastructure, Hashing and Digital Signatures, secret writing Public Key Encryption and Cryptology assist in the implementation of password protection.Set up an NTFS drive applicable for the IIS application and data. If likely, do non tolerate IUSER or whatever the unidentified username access to any of the available drives. If the relevance runs into any problems due the anonymous user does not have entre to programs on the available drive(s), then apply FileMon from Sysinternals to test which file it cannot access and attempt wo rking around it by relocating the program to the IIS drive. If that is not possible, then license IUSER access just to that file.Allow Windows auditing on the machine, since there is never sufficient data when trying to backtrack any attackers movements. It is even likely to have a script run to check for any distrustful activity via the audit logs, and then send an account to an administrator. Now this could appear a bit extreme, except if security is actually significant in your organization, this sort of action is an excellent practice. Set up auditing to account any failed account log in attempts. Plus, equivalent as the IIS logs, alter the default location to a different location, and make sure that the company have a backing and a replicated copy (Weaver, Weaver, & Farwood, 2013).On a customary basis, go through as a lot of security articles from various sources as the company can. It is at all times go that company appreciate as much as possible about IIS and universal

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.