.

Wednesday, October 30, 2019

Vulnerability Assessment on your System at Home Essay

Vulnerability Assessment on your System at Home - Essay Example Hackers having time, resources and enthusiasm can breach into any system. Even the system with the most enhanced security architecture cannot guarantee 100% that it will not be hacked or are safe from viruses. Firewalls help to secure the network from unwanted data by packet filtering technologies. Routers can help secure Internet and network gateways. Virtual private networks transmit data after encryptions in a secure tunnel. Anti viruses software detects viruses, spywares, and malicious activities. The success of these technologies is reliant on the expertise of a professional, who is responsible for monitoring, maintaining, configuring and updating the system of regular basis. Updating the system also involve the expertise required for updating the services and kernels effectively. Continuous monitoring of the network vigilance is also an important factor. If we take an example of an enterprise network, these networks are comprised of components such as Servers, Firewalls, File servers, Intrusion detection software and hardware, routers, switches etc. As we know that security threats are always a debatable topic because they keep on disrupting networks, it will be intimidating to handle the network vigilance along with updates and maintenance of the huge enterprise network. For maintaining the enterprise networks multiple expertise are required. It is unavoidable that networks will be completely safe from threats, disruption of services and vulnerabilities. For analyzing vulnerabilities, networks must be investigated for possible weaknesses. Vulnerability assessment of the home system and network resources can reveal potential issues that can be addresses before the hacker identifies them. It is an internal audit of system security and network resources. It involves regular network vulnerability scanning of the system to ensure the co nfigurations are meeting the standards along with the checking of latest

No comments:

Post a Comment