How to make a system in Network secure?
Answers were Sorted based on User's Feedback
Answer / nimesh maru
Hardend the system ( does not matter which OS ) Run the
vulnerability test if possible, Install the necessary Patch
. Make sure you download the patch from the vendor site or
Trusted Location. Disable all unwanted services. Remove all
the unwanted users from the systems Profile. Have good Anti
virus software installed and make sure it is updated
regularly. Install a good Firewall software and even that
should be updated regularly. Install a good Malware,
spyware, adwareremover. Make sure u run the disk encryption
on the system. Disable access to cd rom/ dvd rom drives and
usb port. There are many more things to do but few have been
listed here.
Is This Answer Correct ? | 12 Yes | 1 No |
Answer / sureshn
use unix o/s as data will secured and no chance of virus
Is This Answer Correct ? | 17 Yes | 11 No |
Answer / raghul
to make a system secure we need firewall and encryption
software..
Is This Answer Correct ? | 3 Yes | 2 No |
SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)
What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.
Explain the difference between discretionary access control and mandatory access control?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
Explain what does cia stand for in security management?
What are difference between Juniper and checkpoint firewall? and Can you explain me about the difference between checkpoint and Cisco pix firewall ?
7 Answers Accenture, HCL, IBM, Wipro,
Different Bitwin ADSL & DSL ROUTER? How To Configure
What do you do when you get blue screen in a computer? How do you troubleshoot it?
Explain difference between broadcast domain and collision domain?
How long can a ddos attack last?
How Can I recover My Hotmail Account without phone no and email?
What is Cross site scripting?