Friday, October 4, 2019

Security Analysis and Redesign of a Network Essay

Security Analysis and Redesign of a Network - Essay Example Service Information: Operating System: Linux 2.5.25 - 2.6.3 or Gentoo 1.2 Linux 2.4.19 rc1-rc7. Interesting ports on XYZ Invite Design at domain 192.168.0.6: Nmap done: 6 IP address (6 hosts up) scanned in 64.27 seconds. Password strengths are essential in security matters. Users’ password must be encrypted so as to prevent unauthorized entries to the system (Stewart, 2010). The Public Key Infrastructure, Hashing and Digital Signatures, Cryptography: Public Key Encryption and Cryptology assist in the implementation of password protection. Set up an NTFS drive applicable for the IIS application and data. If likely, do not tolerate IUSER or whatever the unidentified username access to any of the available drives. If the relevance runs into any problems due the anonymous user does not have admission to programs on the available drive(s), then apply FileMon from Sysinternals to test which file it cannot access and attempt working around it by relocating the program to the IIS drive. If that is not possible, then permit IUSER access just to that file. Allow Windows auditing on the machine, since there is never sufficient data when trying to backtrack any attackers movements. It is even likely to have a script run to check for any distrustful activity via the audit logs, and then send an account to an administrator. Now this could appear a bit extreme, but if security is actually significant in your organization, this sort of action is an excellent practice. Set up auditing to account any failed account log in attempts. Plus, same as the IIS logs, alter the default location to a different location, and make sure that the company have a backing and a replicated copy (Weaver, Weaver, & Farwood, 2013). On a customary basis, go through as a lot of security articles from various sources as the company can. It is at all times better that company appreciate as much as possible about IIS and universal

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.