Page 150 - DCAP516_COMPUTER_SECURITY
P. 150

Computer Security




                    Notes              A strong Antivirus software package and Internet Security Software package.
                                       For authentication, use strong passwords and change it on a weekly/bi-weekly basis.
                                       When using a wireless connection, use a robust password.
                                       Exercise physical security precautions to employees.
                                       Prepare a network analyzer or network monitor and use it when needed.
                                       Implement physical security management like closed circuit television for entry areas
                                       and restricted zones.
                                       Security fencing to mark the company’s perimeter.
                                       Fire extinguishers for fire-sensitive areas like server rooms and security rooms.
                                       Security guards can help to maximize security.

                                   School

                                       An adjustable firewall and proxy to allow authorized users access from the outside and
                                       inside.
                                       Strong Antivirus software and Internet Security Software packages.
                                       Wireless connections that lead to firewalls.

                                       Children’s Internet Protection Act compliance.
                                       Supervision of network to guarantee updates and changes based on popular site usage.
                                       Constant supervision by teachers, librarians, and administrators to guarantee protection
                                       against attacks by both internet and sneakernet sources.

                                   Large Government


                                       A strong firewall and proxy to keep unwanted people out.
                                       Strong Antivirus software and Internet Security Software suites.
                                       Strong encryption, usually with a 256 bit key.
                                       Whitelist authorized wireless connection, block all else.

                                       All network hardware is in secure zones.
                                       All host should be on a private network that is invisible from the outside.
                                       Put all servers in a DMZ, or a firewall from the outside and from the inside.
                                       Security fencing to mark perimeter and set wireless range to this.

                                   Self Assessment

                                   Fill in the blanks:
                                   1.  A computer host’s security is vulnerable to users with higher ..................... privileges to
                                       those hosts.
                                   2.  ..................... between two hosts using the network could be encrypted to maintain privacy.
                                   3.  Network ..................... starts from authenticating any user.

                                   4.  Security Management for networks is ………………………for all kinds of situations.



          144                               LOVELY PROFESSIONAL UNIVERSITY
   145   146   147   148   149   150   151   152   153   154   155