Wednesday, May 8, 2019

Secure Computer System Essay Example | Topics and Well Written Essays - 750 words

unattackable Computer System - Essay ExampleFirewalls are the most common security measures for computer networks. original mechanisms are put in place in order to provide adequate security to nurse resources on the trusted network against potential access by attackers. There are numerous mechanisms in network security, one of which is the DMZ or Demilitarised Zone. DMZ is a network which is semi-protected and is common to medium shell to large scale enterprise (Pickering, 2009).DMZ has two (2) disadvantages First, the firewall fag end be created to pass trusted services at heart the application gateway(s), thus, subverting the policy. The trusted services which get passed all around the application gateway typically end up being in contact with the site systems. Another disadvantage is placed on the routers for theprovision of security. tract filtering routers seemed complex to configure and errors could disclose the whole site to security holes (Wack, 2009). Added by Pickeri ng (2003), the application proxy firewalls ordinarily require frequent software updating to run the latest versions of the proxy code. This is important particularly when sore exploits are detected, needs to be blocked, and in the event when problems emerge interactions between the proxy as wholesome as widely deployed applications. Meaning, when the proxy is found actually breaking.3. Using a Microsoft XP or 2000 system, open meshwork Explorer. Open Internet Options under the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be tack to provide a) content filtering, and b) protection from unwanted items like cookies Some actions that Microsoft XP or 2000 system allow a user to do in order to configure content, filtering, and protection from unwanted items like cookies are 1. To modify Windows XP settings for each user and also 2. To assign user to create accounts and passwords in the computer to control the users who can access on the system . In other words, users who are not the administrators will have no access, uneffective to change critical system files or delete it. The system may also be upgraded by logging off from a regular user account, then, logging back in as

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.