Free Essay

Sec280-Week2

In:

Submitted By alexjolliff
Words 602
Pages 3
Dear CIO, It has come to my attention that you are wondering why I should secure Windows and our Unix/Linux servers from shortcomings and vulnerabilities. I will explain to you what I plan to do about these. So, you can understand what these are I will explain to you first what shortcomings are and how they work. Next, I will explain what vulnerabilities are and how they work. Then, I will explain to you what my plan of action to ensure our network infrastructure is strong and make sure it stays that way. First, you are wondering what a shortcoming is. A shortcoming is the quality or state of being flawed. What this means is that there is kind of flaw occurring in the network whether it be one of our employees connecting their personal devices to our network to possible steal our information about the company. Same another example is people thinking the company's computers are their owns and using it to share photos on either Facebook, Twitter or Youtube. These are some examples of short comings that could affect the network. Next, your wondering what vulnerabilities is. Vulnerabilities is essentially being open to attack or damage. Now, your probably wondering what vulnerabilities we have on a network. For instance, we could have one of employees could save information not only on our servers but one a flash drive giving away are information to another company. Other examples might be hackers that work inside the company. Another example is when some one attempts to hack the network from an outside source. It could be an employee, former employee or just a hacker in general. As, ISO, to ensure our network infrastructure is safe I promise to buy and use the program that we used in the military. It is called USBTrace: Software-only USB Protocol Analyzer. This program is used to detect and track USBs being plugged into the into the network. What, I like about this program is that it can decode the following HID, Hub, Video, Audio, Mass Storage, and many more. Another thing we continue to do is when we lose a fellow employee we disable the user availability to get into the LAN or servers. We also delete all information that user that was ever saved on their profile. Finally to make sure our Unix/Linux Servers safe we change the IP Address on the servers at night when we lose one of our employees. That way we don't lose productivity during the day and if we need to have a night shift then we notfiy the employees that we will be bringing down the system for maintenance repairs. That way they can save their information and not worry about losing anything. In the last couple of paragraphs we discussed what shortcomings are and how they work. I also described to you what vulnerabilities we have could have in our network and what they are. I then explained to you in two ways we can ensure safety on our Unix/Linux Servers to ensure the safety of our infrastructure.

References
Conklin, Wm. Arthur (2010). Principles of Computer Security: Security+ and Beyond [2] (VitalSource Bookshelf), Retrieved from http://online.vitalsource.com/books/0073398756/id/pg13
Webster. (n.d.). Shortcoming - Definition and More from the Free Merriam-Webster Dictionary. Dictionary and Thesaurus - Merriam-Webster Online. Retrieved November 8, 2012, from http://www.merriam-webster.com/dictionary/shortcoming
Webster. (n.d.). Vulnerabilities - Definition and More from the Free Merriam-Webster Dictionary. Dictionary and Thesaurus - Merriam-Webster Online. Retrieved November 8, 2012, from http://www.merriam-webster.com/dictionary/vulnerabilities

Similar Documents

Premium Essay

Sec280 Week2

...There are some basic safeguards that are important in ensuring that the network infrastructure remains secure for both of the Windows based server and the UNIX/Linux based server. Although both servers utilize the basic level of security, there are vulnerabilities that exist that could be exploited if additional measures are not taken to address them. The following information outlines the steps that are currently in place to address server and other network vulnerabilities. The first step in addressing vulnerabilities that exist within the Windows and UNIX/Linux servers, and the firewall, is making sure that all the latest updates and service patches are installed on all hardware. The Windows based server is utilizing the automatic update feature, and has been configured to allow the download and install all security, reliability, and compatibility updates. The UNIX/Linux based server is also configured to automatically update, downloading and installing updates daily. These updates will enable the servers to obtain the latest patches and updates. This makes sure the firewall will protect our network against the latest viruses, worms, Trojan horses or bugs that would have been created since the last update of the program. Scheduling these services to automatically update our equipment will ensure that the current and newly discovered vulnerabilities are dealt with immediately and considered a must to secure us against these types of problem and intrusions. The next step...

Words: 805 - Pages: 4