Explain network and system security 050-22 stro’ group student Temirov Okhunjon Explain network and system security Network security



Download 0,58 Mb.
bet2/3
Sana11.11.2022
Hajmi0,58 Mb.
#864071
1   2   3
Bog'liq
6 Explain network and system security

Network Security:For years, organizations have neglected network security like small town residents don't lock their doors. Open doors have been closed and locked as the proliferation of the Internet and the global web has affected this attitude to networking.
Why is security important?Securityis important, because computer systems and networks contain a wide range of information and resources that need to be protected. When you use your credit card to make an online purchase, you trust that the online merchant is providing you with a secure connection at the time of the transaction and that there is no risk to the information you provide. employees trust Security to protect their personal information, such as their social security number or family information. The student makes sure that the computer is accessible and that the program is running each time he enters the results of the experiment. These are some of the reasons why network security is essential.
1. Protect information and resources in such a way that businesses or organizations can continue to operate without problems or interruptions.
2. Confidentiality of personal information such as medical records is guaranteed
3. Protects against identity and credit card theft.
4. Facilitates the flow of work processes without interruptions and disruptions in the work and gaming of family members, students and employees of the organization.
5. It deters computer hackers from launching further malicious attacks.
Using the protection capabilities of the operating system:Operating systems have many capabilities that ensure system stability. Some of the options that can be configured are:
1. Require every user registered on the network to log in with a strong password.
2. Use the best forms of authentication and encryption your operating systems can offer when users log on to the network.
3. Use digital certificate protection for network connections. Digital certification is necessary to verify the authenticity of transmissions between network computers, that is, to make sure that the devices being connected are really themselves.
4. Configure permissions for folder and file security.
5. Avoid public resource protections such as public access rights.
6. Set up security policies for users, such as requiring a "hard" password and locking out a user's account after a certain number of failed network logins.
7. Set the highest protection level available on the system for the wireless network.
8. For remote connections, especially wireless networks, use a Virtual Private Network - VPN.
9. Use disaster recovery technologies such as backup for regular backups.

Download 0,58 Mb.

Do'stlaringiz bilan baham:
1   2   3




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish