StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Addressing Security Vulnerabilities in Windows Server - Case Study Example

Cite this document
Summary
The paper "Addressing Security Vulnerabilities in Windows Server" explores a few shortcomings and vulnerabilities of Windows servers. As an Information Security Officer, the responsibility of the security of the information of employees and data of the company and its clients comes over the author…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Addressing Security Vulnerabilities in Windows Server
Read Text Preview

Extract of sample "Addressing Security Vulnerabilities in Windows Server"

Being a nationally recognized company has given us many advantages and disadvantages and along with these comes a lot of responsibilities on our shoulders. An issue that comes is that the operating systems provided by Windows do not supply dependable firewalls to prevent the hacking of our operating systems. And another problem is the security policies provided by the Windows operating systems. The security standards that are already provided are not good and the safety policy settings and the password schemes are not strong and are quite vulnerable. The data encryption by the Windows operating systems is also not good and is quite feeble and also there are no tough encryption schemes or standards in place. (Gibson, 2011)

These issues and problems can become a problem for us as the information of our company, the company’s employees and the company’s customers are at a risk and if any information is leaked then it might become a problem for us and disrepute our company. I have got a few good ideas that can make the company overcome these issues and problems with ease. Windows has already faced such problems in the past and has upgraded its latest operating systems to overcome these problems and issues. There latest server version Windows Server 2008 RC2 includes many solutions for such problems.

These solutions and upgrades are very impressive and I have already tested them with my own self and believe that the company should also upgrade its operating systems and servers into this current operating thus making the company’s, its clients, and its employees important data to be secure. The upgrades in the server include the Server Manager for managing security components. This upgrade provides help for managing, installing, and configuring server roles and the features that are available on the server. Another upgrade is the Server Core Installation. This allows us to install a smaller version of windows with fewer unnecessary features that makes hacking of the server difficult as there are barely any areas to attack. Another upgrade is the BitLocker Drive Encryption. This secures that no hacker can gain any access to or understands important data. (Gibson, 2011)

Other upgrades include Network Access Point (NAP), Digitally Signed Files, Address Space Layout Randomization (ASLR), and Read-Only Domain Controller (RODC). These upgrades will make the system more secure and safe. It will also ensure that hackers cannot breach in and gain access to delicate information of our company, our customers, and our employees. These upgrades will change the face of the company as the user interface will become more user-friendly for employees while more hard and tough for the attackers who want to breach and use the delicate information that our servers and operating systems hold (Kanjilal, 2010).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case study Example | Topics and Well Written Essays - 500 words - 75”, n.d.)
Case study Example | Topics and Well Written Essays - 500 words - 75. Retrieved from https://studentshare.org/information-technology/1656898-case-study
(Case Study Example | Topics and Well Written Essays - 500 Words - 75)
Case Study Example | Topics and Well Written Essays - 500 Words - 75. https://studentshare.org/information-technology/1656898-case-study.
“Case Study Example | Topics and Well Written Essays - 500 Words - 75”, n.d. https://studentshare.org/information-technology/1656898-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Addressing Security Vulnerabilities in Windows Server

Network Systems and Technology

hellip; The network server can be a domain controller, firewall, or Windows NT server.... The requirement of the network server will emphasize on the requirements of the network.... The RADIUS access server will provide synchronization of data between both sites operating on a Virtual Private Network.... Topology We will apply star topology, as the network design will follow a centralized server/client architecture....
12 Pages (3000 words) Term Paper

DragonSoft Vulnerability Management Tool

Certified skilled professionals, certified vulnerability assessment tools, incident response management teams and other relevant staff plays a significant role for protecting and detecting potential threats and vulnerabilities that may or have compromise the network to gain access to business critical information of the organization.... There is a requirement of a powerful vulnerability assessment and management tool that will facilitate the network security team in crises situations....
7 Pages (1750 words) Essay

Vulnerability Analysis

This essay ''Vulnerability Analysis'' discusses that vulnerability analysis that is also called vulnerability assessment is a method that is aimed to identify, classify and express security weaknesses in a computing device or a computer network or an Information Technology infrastructure of an organization.... Some of the steps that may incorporate vulnerability analysis include: Classification of resources on the network Tagging importance level to the classified resources Identification of current and potential threats to these tagged and classified resources Defining strategy for addressing serious issues on the initial level Defining processes and procedures to address security breaches....
9 Pages (2250 words) Essay

Network Security

hellip; As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.... The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well.... Secondly, internal and physical security will discuss human threats, physical access to server rooms and servers, sensors and sprinklers etc....
16 Pages (4000 words) Research Paper

Information Security: Policy, Processes, and Practices

This research proposal "Information security: Policy, Processes, and Practices" discusses different factors that must be taken into account when constructing and maintaining an information security policy.... However, there are many methods available for constructing an information security policy.... In the context of protecting information security, three fundamental factors must be considered to make use of digitized information in an effective manner i....
17 Pages (4250 words) Research Proposal

Network Security and Its Business Impact

This essay presents network security which has become a major issue in the business world.... Thus, the need of the hour is to identify the security loopholes and develop security policies especially for environments where the wired and wireless networks co-exist.... 3 Situation Overview: The research is set in MajanCollege in the context of improvising the security of the college network after adding the wireless network (Wireless LAN) with the existing wired network (Local LAN)....
8 Pages (2000 words) Essay

Analysis of Network Infrastructure

hellip; Moreover, for addressing security, a comprehensive information security risk assessment is conducted that identifies critical assets and vulnerable points of the computer network.... DNS Scheme For a new DNS scheme, a new zone should be configured on the internal DNS server that may resemble every domain of the organization.... om However, for addressing the requirement of establishing zones on external DNS server, only one domain will be configured, i....
5 Pages (1250 words) Term Paper

Risk Assessment for Incident Management Group

Vulnerabilities are defined as weaknesses in a system, network, workstation, or server.... There may be a risk of failure of the power supply is a critical server that is mitigated by deploying a redundant power supply that may automatically operate once the problem arrived hence mitigate downtime.... Failure due to surge and electricity fluctuations are common computer hazards, in order to avoid these risks, the IT department has taken necessary action to overcome the situational hazards to make all of the available web server hard drives in form of array called Redundant Arrays of inexpensive disk (RAID level 5) that mitigate downtime for business-critical web server due to hard disk failure....
11 Pages (2750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us