Securing the Enterprise Infrastructure: A Detailed Analysis
VerifiedAdded on 2022/08/26
|7
|1468
|10
Report
AI Summary
This report provides a comprehensive overview of securing enterprise infrastructure. It begins by exploring various techniques to enhance the security of Windows networks, including implementing strong authentication, upgrading security patches, securing physical equipment, developing cybersecurity policies, adopting strong password policies, and installing anti-virus software. The report then details the steps required to connect computers together, emphasizing the use of network adapters and Ethernet cables. Furthermore, it delves into the principles of the CIA triad—confidentiality, integrity, and availability—as fundamental aspects of information security. The report explains each principle, providing real-life examples such as cryptography, access control, hash algorithms, and methods to ensure data access for authorized users. The conclusion summarizes the key findings and emphasizes the importance of these security measures in protecting organizational data and ensuring network integrity. The report references several relevant sources to support its findings.

Running head: SECURING THE ENTERPRISE INFRASTRUCTURE
SECURING THE ENTERPRISE INFRASTRUCTURE
Name of the Student
Name of the University
Author Note:
SECURING THE ENTERPRISE INFRASTRUCTURE
Name of the Student
Name of the University
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1SECURING THE ENTERPRISE INFRASTRUCTURE
Introduction:
Microsoft computers are popularly known for its best computing services. One of the
most successful launch of Microsoft is the Microsoft Windows which was introduced in the
market in the year 1985. However, linking two or more windows computers are very difficult
thus is requires advance technology to connect with each other as well as to communicate with
each other (Lee 2019).
Techniques to ensure the security of windows network:
Followed by above consideration a detailed investigation has been conducted with the
purpose to gather information the techniques that will help to connect two or more computer in
order to enhance their working capabilities. However, apart from connecting the computers it is
also very essential to protect them in order to ensure security to the windows network. Thus, a
list of effective techniques to ensure security of windows network are mentioned below:-
Implementation of strong authentication method- will help to ensure security to the windows
network. Due to the implementation of this method the network will be capable of two step
authentication process by which the login credentials will be well verified (Stefanovic &
Kranjac 2019).
Upgrade the security patch and software of the system- as in the nominated case scenario it is
very essential to apply effective security services to the windows network with the purpose to
protect the windows network. Thus, it is very essential to upgrade the old security patches
with current security strategies in order to ensure security to the windows network.
Security to the physical equipment and port- is very essential as this will help to enhance the
security of the hardware devices which will help to protect the confidential information of the
Introduction:
Microsoft computers are popularly known for its best computing services. One of the
most successful launch of Microsoft is the Microsoft Windows which was introduced in the
market in the year 1985. However, linking two or more windows computers are very difficult
thus is requires advance technology to connect with each other as well as to communicate with
each other (Lee 2019).
Techniques to ensure the security of windows network:
Followed by above consideration a detailed investigation has been conducted with the
purpose to gather information the techniques that will help to connect two or more computer in
order to enhance their working capabilities. However, apart from connecting the computers it is
also very essential to protect them in order to ensure security to the windows network. Thus, a
list of effective techniques to ensure security of windows network are mentioned below:-
Implementation of strong authentication method- will help to ensure security to the windows
network. Due to the implementation of this method the network will be capable of two step
authentication process by which the login credentials will be well verified (Stefanovic &
Kranjac 2019).
Upgrade the security patch and software of the system- as in the nominated case scenario it is
very essential to apply effective security services to the windows network with the purpose to
protect the windows network. Thus, it is very essential to upgrade the old security patches
with current security strategies in order to ensure security to the windows network.
Security to the physical equipment and port- is very essential as this will help to enhance the
security of the hardware devices which will help to protect the confidential information of the

2SECURING THE ENTERPRISE INFRASTRUCTURE
organization with the purpose to provide security to the organizational network (Sundar &
Kumar 2016).
Development of cyber security policy- will help the organization to regulate the security
plans of the organization. As adoption of effective security regulation will help the
organization to protect their computer networks from external threats. While analyzing the
reason behind this adoption it is identified that due to the adoption of effective security
regulation will help to control the behavior of the user which will majorly influence the
security feature of the computer network.
Adopt strong password policy- will help to protect the confidential data of the organization
from external threat. Thus, incorporating effective password policy will help to ensure that
the windows network is secure.
Installation of anti-virus- will also help to enhance the security of the windows server as this
will help to eliminate the threat of virus into the computer network.
After completion of the above discussion it can be stated that these techniques will definitely
help to keep the windows network secure and safe.
How to connect computers together?
In order to connect the computer network without losing the data of the organization
there are several steps to follow, which will help to connect two or more computers together. A
detailed elaboration of the required steps are listed below-
Step 1- At first it requires to place all the computer in to available mode.
Step 2- Install network adapter with the computer devices and place the adapter near to all
systems
organization with the purpose to provide security to the organizational network (Sundar &
Kumar 2016).
Development of cyber security policy- will help the organization to regulate the security
plans of the organization. As adoption of effective security regulation will help the
organization to protect their computer networks from external threats. While analyzing the
reason behind this adoption it is identified that due to the adoption of effective security
regulation will help to control the behavior of the user which will majorly influence the
security feature of the computer network.
Adopt strong password policy- will help to protect the confidential data of the organization
from external threat. Thus, incorporating effective password policy will help to ensure that
the windows network is secure.
Installation of anti-virus- will also help to enhance the security of the windows server as this
will help to eliminate the threat of virus into the computer network.
After completion of the above discussion it can be stated that these techniques will definitely
help to keep the windows network secure and safe.
How to connect computers together?
In order to connect the computer network without losing the data of the organization
there are several steps to follow, which will help to connect two or more computers together. A
detailed elaboration of the required steps are listed below-
Step 1- At first it requires to place all the computer in to available mode.
Step 2- Install network adapter with the computer devices and place the adapter near to all
systems
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3SECURING THE ENTERPRISE INFRASTRUCTURE
Step 3- Followed by the completion of the above threat it is required to connect the Ethernet
ports with all of the computers that requires to connect with each other.
Step 4- In this step connect the computer monitor cable with the network adapter.
Step 5- After completion of the above steps it will then requires to connect the keyboard of with
the adapter and switch on all of the computers (Tan et al., 2018).
After completion of these step all of the connected computers can be accessed by a single
computer. The above discussed steps are used to connect the computers using Ethernet cable and
in order establish the connection it requires computer connectors, computers, network adapter as
well as the Ethernet cables.
Principles of CIA to secure computer network:
After analyzing the above concern it can be stated that CIA triads are the basic
characteristics of information security that is very useful protecting the data of the organization.
CIA triad stands for information confidentiality, information integrity and the information
availability. While analyzing each of these characteristics it is identified that information
confidentiality is such concept that has intended to prevent the organizational network or any
user’s data from unauthorized access as these data sometimes contains sensitive data as well.
Thus, it can be stated that breaching these data may significantly harm the privacy of the user
(Metivier 2017).
Followed by this identification it can be stated that cryptography, access control,
symmetric and asymmetric algorithms are the real life example of information confidentiality
principle. While analyzing these methods it is identified that cryptography is such technique by
which the transaction can be encrypted which will help to restrict unauthorized access of the
Step 3- Followed by the completion of the above threat it is required to connect the Ethernet
ports with all of the computers that requires to connect with each other.
Step 4- In this step connect the computer monitor cable with the network adapter.
Step 5- After completion of the above steps it will then requires to connect the keyboard of with
the adapter and switch on all of the computers (Tan et al., 2018).
After completion of these step all of the connected computers can be accessed by a single
computer. The above discussed steps are used to connect the computers using Ethernet cable and
in order establish the connection it requires computer connectors, computers, network adapter as
well as the Ethernet cables.
Principles of CIA to secure computer network:
After analyzing the above concern it can be stated that CIA triads are the basic
characteristics of information security that is very useful protecting the data of the organization.
CIA triad stands for information confidentiality, information integrity and the information
availability. While analyzing each of these characteristics it is identified that information
confidentiality is such concept that has intended to prevent the organizational network or any
user’s data from unauthorized access as these data sometimes contains sensitive data as well.
Thus, it can be stated that breaching these data may significantly harm the privacy of the user
(Metivier 2017).
Followed by this identification it can be stated that cryptography, access control,
symmetric and asymmetric algorithms are the real life example of information confidentiality
principle. While analyzing these methods it is identified that cryptography is such technique by
which the transaction can be encrypted which will help to restrict unauthorized access of the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4SECURING THE ENTERPRISE INFRASTRUCTURE
organizational data. Along with this data Encryption Standard, Advanced Encryption Standard
and One-time pads are also one of the effective examples of information confidentiality
(Kalaiprasath, Elankavi & Udayakumar 2017).
Information integration is such concept that enhances the data security by preventing the
unauthorized modification of the hacker. The primary objective of this principle is to maintain
the data consistency. While analyzing the real life example of this principle it is identified that
hash algorithms are very effective in maintain information consistency. The hashing techniques
includes Secure Hash Algorithm (SHA), Message Digest Algorithm (MD) and RACE Integrity
Primitives Evaluation Message Digest (RIPEMD) (Henderson 2017).
Along with this information availability is also one of the important aspect of data
security which will make sure that all of the verified users will get the access of their data all the
time. While discussing this aspect it is observed that Distributive allocation, High availability
(HA), Redundancy and Fault tolerance are such methods which helps to achieve the information
availability (Guhan et al., 2018).
Conclusion:
After completion of the above discussion it can be stated that this paper has effectively
discussed about the information security aspect and it has effectively analyzed the principles of
the information security as well.
organizational data. Along with this data Encryption Standard, Advanced Encryption Standard
and One-time pads are also one of the effective examples of information confidentiality
(Kalaiprasath, Elankavi & Udayakumar 2017).
Information integration is such concept that enhances the data security by preventing the
unauthorized modification of the hacker. The primary objective of this principle is to maintain
the data consistency. While analyzing the real life example of this principle it is identified that
hash algorithms are very effective in maintain information consistency. The hashing techniques
includes Secure Hash Algorithm (SHA), Message Digest Algorithm (MD) and RACE Integrity
Primitives Evaluation Message Digest (RIPEMD) (Henderson 2017).
Along with this information availability is also one of the important aspect of data
security which will make sure that all of the verified users will get the access of their data all the
time. While discussing this aspect it is observed that Distributive allocation, High availability
(HA), Redundancy and Fault tolerance are such methods which helps to achieve the information
availability (Guhan et al., 2018).
Conclusion:
After completion of the above discussion it can be stated that this paper has effectively
discussed about the information security aspect and it has effectively analyzed the principles of
the information security as well.

5SECURING THE ENTERPRISE INFRASTRUCTURE
Reference:
Guhan, S., Arumugham, S., Janakiraman, S., Rengarajan, A., & Rajagopalan, S. (2018, May). A
Trio Approach Satisfying CIA Triad for Medical Image Security. In International
Conference on ISMAC in Computational Vision and Bio-Engineering (pp. 1109-1121).
Springer, Cham.
Henderson, A. (2017). The CIA Triad: Confidentiality, Integrity, Availability. Panmore Institute.
Kalaiprasath, R., Elankavi, R., & Udayakumar, D. R. (2017). Cloud Information Accountability
(Cia) Framework ensuring accountability of data In cloud and security in end to end
process in cloud terminology. International Journal Of Civil Engineering And
Technology (Ijciet) Volume, 8, 376-385.
Lee, T. (2019). Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to
automate and manage Windows administrative tasks. Packt Publishing Ltd.
Metivier, B. (2017). Fundamental objectives of information security: The CIA triad. In Sage
Data Security.
Stefanovic, V., & Kranjac, S. (2019). Identity with Windows Server 2016: Microsoft 70-742
MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group
Policy in Windows Server 2016. Packt Publishing Ltd.
Sundar, K., & Kumar, S. (2016). Blue Screen of Death Observed for Microsoft Windows Server
2012 R2 under DDoS Security Attack. Journal of Information Security, 7(04), 225.
Reference:
Guhan, S., Arumugham, S., Janakiraman, S., Rengarajan, A., & Rajagopalan, S. (2018, May). A
Trio Approach Satisfying CIA Triad for Medical Image Security. In International
Conference on ISMAC in Computational Vision and Bio-Engineering (pp. 1109-1121).
Springer, Cham.
Henderson, A. (2017). The CIA Triad: Confidentiality, Integrity, Availability. Panmore Institute.
Kalaiprasath, R., Elankavi, R., & Udayakumar, D. R. (2017). Cloud Information Accountability
(Cia) Framework ensuring accountability of data In cloud and security in end to end
process in cloud terminology. International Journal Of Civil Engineering And
Technology (Ijciet) Volume, 8, 376-385.
Lee, T. (2019). Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to
automate and manage Windows administrative tasks. Packt Publishing Ltd.
Metivier, B. (2017). Fundamental objectives of information security: The CIA triad. In Sage
Data Security.
Stefanovic, V., & Kranjac, S. (2019). Identity with Windows Server 2016: Microsoft 70-742
MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group
Policy in Windows Server 2016. Packt Publishing Ltd.
Sundar, K., & Kumar, S. (2016). Blue Screen of Death Observed for Microsoft Windows Server
2012 R2 under DDoS Security Attack. Journal of Information Security, 7(04), 225.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6SECURING THE ENTERPRISE INFRASTRUCTURE
Tan, C. B., Hijazi, M. H. A., Lim, Y., & Gani, A. (2018). A survey on Proof of Retrievability for
cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and
future trends. Journal of Network and Computer Applications, 110, 75-86.
Tan, C. B., Hijazi, M. H. A., Lim, Y., & Gani, A. (2018). A survey on Proof of Retrievability for
cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and
future trends. Journal of Network and Computer Applications, 110, 75-86.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.