We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
2/4 steps

How Many Pages?

3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Get Offer

Assignment writing for nursing

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (SEC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with map to find any vulnerabilities that comes room having open ports.

Don't use plagiarized sources. Get Your Custom Essay on
Assignment writing for nursing
Just from $13,9/Page
Get custom paper

After the initial scan the administrator should close open ports and install unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with map to make sure that there are no ports or services that they may have missed during their first run. Map is not the only program that can identify vulnerabilities within a server, the CSCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting.

(Solomon, 2014)

In addition to removing programs and services network administrators should also restrict the accesses the users have on client systems limit what they can do to effect the security of the network. If users could change the security settings or download third party software from potentially unsafe websites they could very easily compromise the security of the network. By limiting user access and defining user roles network administrators can potentially prevent future system vulnerabilities that a user may introduce to the system either unwittingly or lusciously.

Another system hardening measure that should be taken to help secure the client side of the network is disabling the default administrator account after you create additional administrator accounts assigned to different roles. (Solomon, 2014) Works Cited SEC-Council. (2009).

Cite this Assignment writing for nursing

Assignment writing for nursing. (2018, Jun 20). Retrieved from https://graduateway.com/assignment-writing-for-nursing/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page