Nobody downloaded yet

Practical Windows Security - Essay Example

Comments (0) Cite this document
Summary
The essay reveals the definition of security vulnerability and tells that it can be regarded as the preliminary filter that is applicable to various issues. In order to protect the system from security threats, there are certain recommended practices in the Practical Windows Security that need to be followed…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Practical Windows Security
Read TextPreview

Extract of sample "Practical Windows Security"

Download file to see previous pages The first virus that operated on Windows 2000 was detected on 13th January 2000 (Wong 2000). It is known as the Win2000. Install or W2K.Installer virus. Although the virus could not do much damage to the new windows but it provided attackers with the concept to identify the vulnerabilities of the Windows and to invade into the systems with improved attacks in the future.
A definition of security vulnerability can be regarded as the preliminary filter that is applicable to various issues. A security vulnerability can be considered as, “a flaw in a product that makes it infeasible – even when using the product properly —to prevent an attacker from usurping privileges on the user's system, regulating its operation, compromising data on it, or assuming ungranted trust” (Microsoft 2011). Microsoft publishes security bulletins when a specific security issue fulfills the criteria for the standard security definition. However, this does not follow that no action is taken by Microsoft. For instance, if Microsoft finds a bug that does not raise any security vulnerability, the security team nevertheless gives it importance and tries to counter it. In this case, the Microsoft team does not come up with a patch or publish security bulletin; rather the team would include the solution in the product that it is going to release in the future. On the other hand, if a certain issue does fall on the criteria for security vulnerability definition, the security team first tries to establish whether the issue has breached the security policy of the product. When a product is made there is an assortment of instructions that are devised to inform the customer about how a particular product is to be used as well as the promises that it delivers regarding the security it provides.
Common vulnerabilities and exposures (CVE) bring together a list of common security vulnerabilities and exposures which are publically accessible. Common identifiers of CVE play a role in the exchange of data between security products and put forth a baseline index point for the purpose of analyzing coverage of various products such as tools and services (CVE 2011). ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Practical Windows Security Essay Example | Topics and Well Written Essays - 2250 words - 1, n.d.)
Practical Windows Security Essay Example | Topics and Well Written Essays - 2250 words - 1. Retrieved from https://studentshare.org/information-technology/1747916-msc-computer-system-security-practical-windows-security
(Practical Windows Security Essay Example | Topics and Well Written Essays - 2250 Words - 1)
Practical Windows Security Essay Example | Topics and Well Written Essays - 2250 Words - 1. https://studentshare.org/information-technology/1747916-msc-computer-system-security-practical-windows-security.
“Practical Windows Security Essay Example | Topics and Well Written Essays - 2250 Words - 1”, n.d. https://studentshare.org/information-technology/1747916-msc-computer-system-security-practical-windows-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Practical Windows Security

MSc computer system security 'Practical Windows Security'

...? Practical Windows Security Contents Introduction to windows security and vulnerabilities 3 The use of remote procedurecall 5 CVE- 2003-0352 7 Mitigating Factors 9 Security solutions 9 Conclusion 10 Reference List 12 Introduction to windows security and vulnerabilities A Windows system is prone to security threats once it is used as an internet server. The typical installation of the windows NT/2000 and other vulnerabilities makes it an easy target for attackers. This way computer networks are damaged on a regular basis. Although network...
9 Pages(2250 words)Essay

MSc Practical Windows Security ''discussing the Windows Domain structure. Assume a Windows 2000/2003/2008 Domain running in nati

...?Practical Windows Security Table of Contents Introduction The developments in computing have brought a lot of facilities and opportunitiesfor the organizations. On the other hand, these developments have also caused illegal use of computers which created a lot of security issues and challenges for the organizations as well as individuals. This paper offers a deep analysis of some of the prime aspects and issues of practical windows security. This paper will discuss and analyze some of the prime issues and factors regarding various types of attack that can be applied to a Windows 2000 and...
10 Pages(2500 words)Essay

MSc Practical UNIX Security

...?Practical UNIX Security Table of Contents Introduction UNIX is the most popular operating system which has been used extensively, and a lot of people still use it as it has been used in the past. However, a lot of IT experts who used UNIX systems in the earlier period discovered it inflexible from the security point of view. As its control was inspiring, its command-line interface needed technological proficiency; its grammar or syntax was not perceptive, and its interface was not user friendly. However, in the IT market, the UNIX operating system has been the medium for broad transformations that have authorized consumers to seek high quality devoid of random limitations imposed by...
8 Pages(2000 words)Essay

Practical UNIX Security

.... It helps to exploit existing and potential breaches in terms of network security and CVE 2010-3872. References Cve. 2011. Computer Desktop Encyclopedia, , pp. 1. , security definition . Available: http://www.businessdictionary.com/definition/security.html [3/9/2011, 2011]. Common Vulnerabilities and Exposures. 2007. Network Dictionary, , pp. 111-111. CHAFFEY, D., 2006. Internet marketing: strategy, implementation and practice Harlow: Financial Times Prentice Hall. , FastCGI | FastCGI - . Available: http://www.fastcgi.com/drupal/ [3/10/2011, 2011]. , mod_fcgid - Apache HTTP Server . Available: http://httpd.apache.org/mod_fcgid/mod/mod_fcgid.html [3/10/2011, 2011]. , mod_fcgid - FastCGI...
10 Pages(2500 words)Assignment

Practical UNIX Security

...Publishing. 52. Mann Scott, Ellen L. Mitchell (2000). Linux system security: an administrator's guide to open source security tools. Boston: Prentice Hall PTR. 29. Minasi Mark, John Paul Mueller (2007). Mastering Windows Vista Business: Ultimate, Business, and Enterprise, . 13th ed. London: John Wiley and Sons. 41. Negus Christopher (2009). MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X. Boston: John Wiley and Sons. 98. Oppliger Rolf (2009). SSL and TLS: theory and practice. Chicago: Artech House. 29. Osborne Mark (2006). Summitt Paul M, How to Cheat at Managing Information Security. London: Syngress. 87. Pierre Bovet Daniel, Marco Cesati (2006)....
10 Pages(2500 words)Assignment

MSc Practical UNIX Security ''LDAP''

...and raising the Active directory domain functional level to Windows 2003. Moreover, for Linux / UNIX, ‘identity management module’ installation is required on the domain controller along with the configuration of NIS server. LDAP Account Management In order to manage account in the UNIX network environment, the Unix systems are configured with Microsoft Active directory for centralized management of user accounts. Moreover, it also solidify network security by integrating role based access and Kereberized authentication. Consequently, the operational cost is minimized, for the management of UNIX accounts. Moreover, UNIX contains various features for authentication and authorization. The authentication is...
8 Pages(2000 words)Essay

Practical

...? Practical Report on Children and Young People’s Self Identity Children and young people exhibit differences in the way they behave and how they relate with other people, which constitute their personality and individual character traits. This largely involves how children develop a sense of identity in the way they see themselves and how other people view them. This sense of identity develops and changes through a period of time along their childhood. Every person has a unique gradual development of a sense of autonomous and individuality which is relatively different from other people. This concerns the child’s social behavior and his own view about how people relate with him or her depending on the expectations of...
7 Pages(1750 words)Essay

Practical Windows Security - The Identification of Vulnerabilities

...Practical Windows Security against CVE-2003-0352/MS03-026 Table of Contents Introduction Common Vulnerabilities and Exposures or simplyCVE is a record of information security vulnerabilities and experiences that intend to offer frequent names for publicly recognized problems. The objective of Common Vulnerabilities and Exposures is to make it rather easier to share data all through the alienated vulnerability potentials (repositories, expert tools as well as services) by means of this "common enumeration. Additionally, through a widespread identifier it becomes easy to dispense data all through separate services, since many records and various tools until the arrangement...
11 Pages(2750 words)Case Study

Mac VS Windows Security

..., 2011) That being said, Mac, UNIX/Linux machines also use these ports, due to a Windows-file-sharing-compatibility package called Samba. Another vulnerability we are introducing is the Abusing remote Desktop Protocol (RDP). Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. This enhancement can be a threat when it allows an authorized remote user to connect to the operating system. Connection is usually secured by a username and pass. Therefore, it all depends on the strength of the password. Since this works on port 3389, this is easily found by port scanning. This is threat is...
2 Pages(500 words)Essay

Practical Windows Security

...Practical Windows Security WINDOWS DOMAIN STRUCTURE Table of Contents Introduction Windows Domain Structure is a view or ized admittance to a lot of networks or computer components by simply utilizing a particular password and user name. Domain Controllers are employed for security verification call like that logging in, permission scrutiny, etc. For example Windows NT uses the idea of a domain to manage admittance to a group of network resources like that diverse kinds of computer and network tools, applications, services and printers. The user simply logs into the computer domain to obtain admittance to different...
10 Pages(2500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Practical Windows Security for FREE!

Contact Us