SEC280 Principles Of Information Systems Security Paper

744 Words3 Pages

Importance of Securing Servers

Blake Sallee
SEC280: Principles of Information-Systems Security
Professor Pratibha Menon
11/06/2014
DeVry University

Importance of Securing Servers The purpose of this paper is to discuss the importance of securing the Windows and UnixLinux server. This will go over the potential threats Windows severs and UnixLinux are subjected to. The paper will also discuss the potential security measures that can be implemented in order to better protect the servers from harm.
Server Threats According to Ferrill (2014), there are two major threats to a company’s Windows or UnixLinux server. The threats are disgruntled employees and corrupted admin accounts. These threats can be detrimental to the company …show more content…

The second risk to the company’s servers is a corrupted administrative account. This is the equivalent of leaving your front door open with a big neon sign that says, “We are not home.” This is a way for hackers to make their way into the servers and do as much, if not more, damage then the disgruntled employee.
Protecting Windows Servers There are two ways of protecting the Windows based servers from these attacks. These methods are fairly simple to setup and will help keep the confidential information confidential. There security measures are called Desired State Configuration (DSC) and Just Enough Admin (JEA).
Two Types of Security Measures Measure 1. The first security measure is known as Desired State Configuration (DSC). DSC was shipped with the Windows 2012 servers. DSC allows the server administrator to set the roles and features that is required for each individual server. This can be broken down to each administrators server if necessary as well. DSC also does regular checkups on the servers to make sure there is no suspicious activities going …show more content…

These are three simple ways to ensure that the server is secure and everyone has access to what they need. .
Three Types of Security Measures Measure 1. The first security measure is to write a firewall rules into the UnixLinux server. The server administrator can write the firewall rules using the Firewall that come with call Uncomplicated Firewall. This will set parameters for everyone in the company so they can access what they need without having access to what they don’t need to see. This can be done by setting rules on ports, IP addresses, or by services Measure 2. The second security measure is monitoring the servers. This can be done by setting up tripwires. Tripwires know the normal baseline of server activity and will into send an alert if anything unusual happens on the server. There is also a Logwatch that monitors the systems Logs and will send an email to the server administrator if an anomaly is detected in the

More about SEC280 Principles Of Information Systems Security Paper

Open Document