|← Personal Homepage||Human Cloning Technology →|
Windows systems are becoming the targets for many hackers in the world. There has been a rise in the attacks which are targeted at Windows of late. In today's world business connectivity is crucial. In an organization where computers, and hence user, are connected through networking has much better productivity and is able to make decision much more quickly and reliable. These benefits are achieved through connectivity and sharing of information and resource. By connecting to network, users are able to communicate with each other through the use of instant messengers as well as email while also sharing files. Also, through networking, it is possible to share hardware resources such as Hard Drives and Printer which makes the use of resource much more efficient. In many organizations, computers connected through network also share a single connection, which otherwise would only be available on one computer (Smith, 2000).
Configuring Windows SSL
This is a set of rules that provide security over TCP/IP networks for communication using cryptographic methodology so as to also attain data integrity. Cryptography involves encryption and decryption of the information in form of plain text. This protocol therefore can dictate and bring about secure communication between two endpoints such as two computers transacting via the internet. Microsoft, IBM and Netscape are some of the companies using SSL as part of its secure channel (Hontanon, 2001). SSL is implemented over the network model, it provides authentications and confidentiality for information therefore identity and non repudiation are ensured. Data integrity is adhered to since it can't be altered at storage or during transit.
The procedures for setting SSL certificate for windows is shown thus:
To submit the certificate that you have just created, follow the steps that are outlined below:
Procedures for windows patching
Patches are the security updates and tools that major software companies, especially Microsoft, post on their website to help fight with the viruses that are released everyday. It is important to have the latest patches to ensure that the system is safe all the time (Garfinkel, Spafford, & Schwartz, 2003).
To patch the system, make sure that you have the following requirements:
ü Have Internet connection
ü Have firewall installed on the computer
ü Have anti-virus installed on the computer
If you have the above requirements intact, have an internet connection and get the latest release of the antivirus updates of your vendor. After updating your antivirus, make use the anti-virus to identify the viruses and Trojans that are there in your machine. Make sure you only identify. Don't delete anything because these could be part of the system files. If you happen to delete any of windows files, you will not be able to reboot the system. After identifying the viruses and the Trojans, go to the antivirus website and get information about these viruses. After this, download any critical security update for the system (Strebe, 2004).
Monitoring using event logs
All Windows versions have the capability of recording the event logs concerning the security. In a Windows environment, this capability will enable for security monitoring basics. Given the fact that this is dispersed in many windows, it is recommended that other tools be used so that the use of the event logging is proactive.
Security event log in Windows use customized file formats to record security monitoring data. There is need to have a suitable program to read this information; although a text editor can be used, it does not show this information in full. The security event file resides in the %systemroot%\System32\config directory. The access is monitored by Event Log service. It is the Event Log service which enforces access controls to each log. Administrators have the full rights to access these logs (Eckstein, Collier-Brown, 2003).
There are two types of events which get recorded in the Security event log which are success audits and failure audits. The success audits are the instances in which the user or program tried out successfully while the failure audits are the events in which users or programs tried out and failed. An example is the logon activity. If a user tries to log into the system and fails, this event will be recorded in the failure audits.
In conclusion, Windows encounter attacks in their systems and therefore will require enough caution to be taken to secure these systems in the network too. There is the improvement of the kernel so that the firewall is used to filter the attacks so that brutal force attacks can be detected. Windows systems should be updated from time to time to ensure effective system improvement.