Saturday, June 22, 2019

Hardening Computer Networks Essay Example | Topics and Well Written Essays - 1250 words

Hardening Computer Networks - Essay ExampleHowever, an organization can deal with these surety threats by adopting an appropriate security procedure. In fact, there are numerous guidelines and security measures that can be adopted by organizations in order to secure their estimator networks (Nash, 1999 Shelly, Cashman, & Vermaat, 2005 Singhal, 2013). In this scenario, the subject field Institute of Standards and Technology (NIST) is a well-known organization that establishes and provides effective guidelines for promoting information technology (IT) security. In addition, NIST has established a wide variety of standards for securing all kinds of IT resources such(prenominal) as networks, computers, and equipment and so on (Scarfone & Souppaya, 2009). This paper discusses a standard operating procedure on how to properly secure an enterprise computer network apply NIST standards. This paper discusses a variety of mechanisms that organizations can adopt in order to secure their net works.It is believed that the majority of people dont change their default SSIDs. Normally, manufacturers leave access points with a standard network name like that, default, tsunami, etc. In addition, this SSID is distributed users to let them known about the availability of the access point. This default SSID must(prenominal) be changed upon installation to something that does not directly relate to an organization. It is suggested that an organization should not rename its SSIDs to smart set name, brand name, company phone number or something else for which company is famous for. So that a hacker cannot guess it easily (Airtight Networks, 2014).Passwords are the most common type of security measures used to protect data, system and networks from un-authorized access. In fact, passwords are used all the way through the organization to access different services and data. In addition, companys employees need passwords to use their computer or access a network.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.