Monday, June 17, 2019

Secure Computer System Essay Example | Topics and Well Written Essays - 750 words

Secure Computer System - Essay ExampleFirewalls atomic number 18 the most common security measures for computer networks. Certain mechanisms are put in place in order to provide adequate security to protect resources on the trusted network against potential access by attackers. There are numerous mechanisms in network security, one of which is the DMZ or Demilitarised Zone. DMZ is a network which is semi-protected and is common to medium scale to magnanimous scale enterprise (Pickering, 2009).DMZ has two (2) disadvantages First, the firewall can be take a crapd to pass trusted services within the practical application gateway(s), thus, subverting the policy. The trusted services which get passed all around the application gateway typically end up being in contact with the site systems. Another disadvantage is placed on the routers for theprovision of security. Packet filtering routers seemed hard to configure and errors could disclose the whole site to security holes (Wack, 2009 ). Added by Pickering (2003), the application proxy firewalls usually require frequent software updating to run the current versions of the proxy code. This is important particularly when new exploits are detected, needs to be blocked, and in the event when problems emerge interactions between the proxy as well as widely deployed applications. Meaning, when the proxy is found actually breaking.3. Using a Microsoft XP or 2000 system, open Internet Explorer. Open Internet Options under the Tools menu. Examine the contents of the gage and Privacy tabs. How can these tabs be configured to provide a) content filtering, and b) protection from unwanted items like cookies Some actions that Microsoft XP or 2000 system allow a drug user to do in order to configure content, filtering, and protection from unwanted items like cookies are 1. To personalize Windows XP settings for each user and also 2. To assign user to create accounts and passwords in the computer to control the users who can access on the system. In other words, users who are not the administrators will have no access, unable to kind critical system files or delete it. The system may also be upgraded by log off from a regular user account, then, logging back in as

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.