Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
The study provides a reflection on the purpose and outcomes of the lab and clarifies how I defended my network. The approach of defense consisted of three main features including disabling unnecessary services, protection of the management interfaces and applications; and lastly, renaming of unnecessary accounts. According to Hillard, Munson, Cayton & Golder, (2018), in a computing environment, all the three features are highly relevant in the provision of impeccable Information technology (IT) security.
Disabling Unnecessary Services
It is imperative to deactivate or disable unimportant or unnecessary features or services of a network which people may use to access the network from outside. For example, reduction of the number of opened network ports is vital in reducing chances of external attacks especially if the ports were opened for access in public network such as public WIFIs which may be complex to trace an intruder. When switch ports are disabled, an intruder will not have access to the network. Besides educating internal organization’s member regarding the essence of disabling such non- vital Services, it is necessary to effect such arrangements through a Policy of turning off non-essential services (Hillard, Munson, Cayton & Golder, 2018). Apart from that, computer restriction policy is equally important.
Protection of Management Interfaces and Applications
The second approach aims at limiting certain network system features to network administrators, managers, and other authorized users. By restricting the access to management interfaces and applications, regular users and possible intruders are prevented from running applications especially malicious or unknown programs which can endanger the functionality of a network system. In the current era, hackers are employing sophisticated viruses, worms, and bugs which overrun systems and by disabling the ability to run programs such avenues are reduced. Borders, (2015) argues that the implementation of such policies gives only the system administrators the powers to run applications besides allowing them to uninstall applications which they feel may imperil system functionality. Within the same category, Network Password Policy equally works in preventing unauthorized access. Such a policy requires users to keep updating or changing their passwords and never use their devices in public networks.
Renaming Unnecessary Accounts
Renaming of certain accounts is vital as it helps in concealing key features of the network, for instance, while PC computers by default often have guest accounts, it is possible to rename such accounts to trouble an intruder who may be intending to use the accounts’ privileges in accessing a network (Perlman, Kaufman & Speciner, 2016). While in many cases, such accounts are common to all Windows devices and often disabled, they serve certain convenient roles in the system. It is fundamental to derive policies guiding on how guest accounts operate in a network infrastructure to expel misuse.
Summary
In summary, the three steps remove some of the common vulnerabilities in the computer networks, moreover, key features of the approach are notable in educating system users, enacting policies for instance password changing policy, removal of key vulnerability segments such as control of running applications and hiding the management interfaces. The management interface renders more privileges to the user and if accessed by an intruder, the system might be at bigger risk. Password policies equally raise the levels of authentication especially when robust password protocol is deployed. The management of privileges assigns only essential access powers to the users.
References
Hillard, D. L. R., Munson, A., Cayton, L., & Golder, S. (2018). U.S. Patent Application No. 15/396,273.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India.
Borders, K. R. (2015). U.S. Patent No. 9,055,093. Washington, DC: U.S. Patent and Trademark Office.
Hire one of our experts to create a completely original paper even in 3 hours!