logo

The securing the enterprise infrastructure

   

Added on  2022-08-26

7 Pages1468 Words10 Views
Theoretical Computer Science
 | 
 | 
 | 
Running head: SECURING THE ENTERPRISE INFRASTRUCTURE
SECURING THE ENTERPRISE INFRASTRUCTURE
Name of the Student
Name of the University
Author Note:
The securing the enterprise   infrastructure_1

SECURING THE ENTERPRISE INFRASTRUCTURE1
Introduction:
Microsoft computers are popularly known for its best computing services. One of the
most successful launch of Microsoft is the Microsoft Windows which was introduced in the
market in the year 1985. However, linking two or more windows computers are very difficult
thus is requires advance technology to connect with each other as well as to communicate with
each other (Lee 2019).
Techniques to ensure the security of windows network:
Followed by above consideration a detailed investigation has been conducted with the
purpose to gather information the techniques that will help to connect two or more computer in
order to enhance their working capabilities. However, apart from connecting the computers it is
also very essential to protect them in order to ensure security to the windows network. Thus, a
list of effective techniques to ensure security of windows network are mentioned below:-
Implementation of strong authentication method- will help to ensure security to the windows
network. Due to the implementation of this method the network will be capable of two step
authentication process by which the login credentials will be well verified (Stefanovic &
Kranjac 2019).
Upgrade the security patch and software of the system- as in the nominated case scenario it is
very essential to apply effective security services to the windows network with the purpose to
protect the windows network. Thus, it is very essential to upgrade the old security patches
with current security strategies in order to ensure security to the windows network.
Security to the physical equipment and port- is very essential as this will help to enhance the
security of the hardware devices which will help to protect the confidential information of the
The securing the enterprise   infrastructure_2

SECURING THE ENTERPRISE INFRASTRUCTURE2
organization with the purpose to provide security to the organizational network (Sundar &
Kumar 2016).
Development of cyber security policy- will help the organization to regulate the security
plans of the organization. As adoption of effective security regulation will help the
organization to protect their computer networks from external threats. While analyzing the
reason behind this adoption it is identified that due to the adoption of effective security
regulation will help to control the behavior of the user which will majorly influence the
security feature of the computer network.
Adopt strong password policy- will help to protect the confidential data of the organization
from external threat. Thus, incorporating effective password policy will help to ensure that
the windows network is secure.
Installation of anti-virus- will also help to enhance the security of the windows server as this
will help to eliminate the threat of virus into the computer network.
After completion of the above discussion it can be stated that these techniques will definitely
help to keep the windows network secure and safe.
How to connect computers together?
In order to connect the computer network without losing the data of the organization
there are several steps to follow, which will help to connect two or more computers together. A
detailed elaboration of the required steps are listed below-
Step 1- At first it requires to place all the computer in to available mode.
Step 2- Install network adapter with the computer devices and place the adapter near to all
systems
The securing the enterprise   infrastructure_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment | Cyber Security
|23
|2174
|14

Active Directory and Related Aspects of Security
|6
|923
|74

Enhancing Network Security for NextGard: Best Practices and Recommendations
|11
|2582
|64

Vulnerabilities categorized as high
|7
|1269
|70

Report on IT Governance | Study
|5
|780
|25

System Security Management
|6
|1504
|37