Premium Essay

Sec280 Week2

In: Computers and Technology

Submitted By iasmundson
Words 805
Pages 4
There are some basic safeguards that are important in ensuring that the network infrastructure remains secure for both of the Windows based server and the UNIX/Linux based server. Although both servers utilize the basic level of security, there are vulnerabilities that exist that could be exploited if additional measures are not taken to address them. The following information outlines the steps that are currently in place to address server and other network vulnerabilities. The first step in addressing vulnerabilities that exist within the Windows and UNIX/Linux servers, and the firewall, is making sure that all the latest updates and service patches are installed on all hardware. The Windows based server is utilizing the automatic update feature, and has been configured to allow the download and install all security, reliability, and compatibility updates. The UNIX/Linux based server is also configured to automatically update, downloading and installing updates daily. These updates will enable the servers to obtain the latest patches and updates. This makes sure the firewall will protect our network against the latest viruses, worms, Trojan horses or bugs that would have been created since the last update of the program. Scheduling these services to automatically update our equipment will ensure that the current and newly discovered vulnerabilities are dealt with immediately and considered a must to secure us against these types of problem and intrusions. The next step in addressing network vulnerabilities involves the firewall. Hackers will hide their malware inside of a commonly used program, and then direct that commonly used program to establish a connection between one of our company computers and the Internet. Since our firewall does not recognize the programs that are supposed to send and receive messages from the Internet, we restricted all...

Similar Documents

Free Essay


...Dear CIO, It has come to my attention that you are wondering why I should secure Windows and our Unix/Linux servers from shortcomings and vulnerabilities. I will explain to you what I plan to do about these. So, you can understand what these are I will explain to you first what shortcomings are and how they work. Next, I will explain what vulnerabilities are and how they work. Then, I will explain to you what my plan of action to ensure our network infrastructure is strong and make sure it stays that way. First, you are wondering what a shortcoming is. A shortcoming is the quality or state of being flawed. What this means is that there is kind of flaw occurring in the network whether it be one of our employees connecting their personal devices to our network to possible steal our information about the company. Same another example is people thinking the company's computers are their owns and using it to share photos on either Facebook, Twitter or Youtube. These are some examples of short comings that could affect the network. Next, your wondering what vulnerabilities is. Vulnerabilities is essentially being open to attack or damage. Now, your probably wondering what vulnerabilities we have on a network. For instance, we could have one of employees could save information not only on our servers but one a flash drive giving away are information to another company. Other examples might be hackers that work inside the company. Another example is when some one attempts to......

Words: 602 - Pages: 3