Monday, August 26, 2019
Computer Network Security Essay Example | Topics and Well Written Essays - 1000 words
Computer Network Security - Essay Example It is now considered as a fundamental fact that if an application is connected and operates on the network, it can be exploited and compromised. Organizations are keen to build a layered defense of protection to counter cyber threats from internal and external entities. Likewise, there is a requirement to constantly monitor live traffic from and to the World Wide Web, remote connections, the real-time interaction of users to applications, Internet gateways and client interactions with the applications. Code reviews are essential, as patches from vendors must be tested first before implementation into the live environment. However, for effective implementation of patches, patch management practices must be documented and standardized. Likewise, there are effective tools available for performing effective patch management. Secondly, configuration management also plays an essential role in ensuring security for mission-critical aviation applications. For instance, if a faulty hardware c omponent is replaced with the new one, it is important to address issues with hardware compatibility, as any malfunctioned device may introduce the vulnerability. Thirdly, change management procedures must also be documented and approved by the respective application owners prior to any changes to the application. For instance, change request form requiring any changes within the application can be approved and documented for ensuring no vulnerable spots in the architecture and infrastructure. All the identified attack interfaces must be addressed by taking the following factors into consideration (Mitigating security threats by minimizing software attack surfaces.2008): Uninstall and prevent unnecessary features Default utilities and programs that are installed within the operating systems must be utilized (If required) Strong access management by user authentication Remove all default passwords on the application server
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.