Monday, July 29, 2019

Hardening Computer Networks Essay Example | Topics and Well Written Essays - 1250 words

Hardening Computer Networks - Essay Example However, an organization can deal with these security threats by adopting an appropriate security procedure. In fact, there are numerous guidelines and security measures that can be adopted by organizations in order to secure their computer networks (Nash, 1999; Shelly, Cashman, & Vermaat, 2005; Singhal, 2013). In this scenario, the National Institute of Standards and Technology (NIST) is a well-known organization that establishes and provides effective guidelines for promoting information technology (IT) security. In addition, NIST has established a wide variety of standards for securing all kinds of IT resources such as networks, computers, and equipment and so on (Scarfone & Souppaya, 2009). This paper discusses a standard operating procedure on how to properly secure an enterprise computer network using NIST standards. This paper discusses a variety of mechanisms that organizations can adopt in order to secure their networks. It is believed that the majority of people don’t change their default SSIDs. Normally, manufacturers offer access points with a standard network name like that, default, tsunami, etc. In addition, this SSID is distributed users to let them known about the availability of the access point. This default SSID must be changed upon installation to something that does not directly relate to an organization. It is suggested that an organization should not rename its SSIDs to company name, brand name, company phone number or something else for which company is famous for. So that a hacker cannot guess it easily (Airtight Networks, 2014). Passwords are the most common type of security measures used to protect data, system and networks from un-authorized access. In fact, passwords are used all the way through the organization to access different services and data. In addition, company’s employees need passwords to use their computer or access a network.

No comments:

Post a Comment