Wednesday, May 15, 2019

Hardening Computer Networks Essay Example | Topics and Well Written Essays - 1250 words

Hardening Computer Networks - Essay ExampleHowever, an organization can deal with these security threats by adopting an appropriate security mathematical process. In fact, there are numerous guidelines and security measures that can be adoptive by organizations in order to secure their computer networks (Nash, 1999 Shelly, Cashman, & Vermaat, 2005 Singhal, 2013). In this scenario, the National Institute of Standards and Technology (NIST) is a well-known organization that establishes and provides effective guidelines for promoting information technology (IT) security. In addition, NIST has established a wide flesh of standards for securing every kinds of IT resources such as networks, computers, and equipment and so on (Scarfone & Souppaya, 2009). This paper discusses a standard operating procedure on how to properly secure an enterprise computer network using NIST standards. This paper discusses a motley of mechanisms that organizations can adopt in order to secure their networks .It is believed that the majority of people dont alter their default SSIDs. Normally, manufacturers offer access points with a standard network name like that, default, tsunami, etc. In addition, this SSID is distributed users to let them known about the availability of the access point. This default SSID must be changed upon installation to something that does not directly relate to an organization. It is suggested that an organization should not rename its SSIDs to company name, brand name, company phone proceeds or something else for which company is famous for. So that a hacker cannot guess it easily (Airtight Networks, 2014).Passwords are the about common type of security measures used to protect data, system and networks from un-authorized access. In fact, passwords are used all the way through the organization to access different services and data. In addition, companys employees drive passwords to use their computer or access a network.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.