Computing Unit 7 IT Systems Security and Encryption C - D
Computing Unit 7 IT Systems Security and Encryption C - D
Configure a Firewall I ensure that all ports are closed because any
open ports can be accessed and exploited by
hackers.
OS Update Patching operating systems are necessary
because it reduces the number of flaws in the
operating system. If there are any updates
available for the operating system, it must be
updated ton the latest version because update
patches usually include significant
improvements to the system’s security and
patch vulnerabilities, which improve the
overall system performance
Log on rules The next step is log on rules. Log on rules must
be implemented. These rules mostly apply to
passwords. These include password security,
how long passwords are legitimate before
they must be modified, and the number of
recalled passwords. They are also required to
ensure that employees make strong
passwords which in turn makes their accounts
difficult to access by hackers.
Shared folders After log on rules have been implemented the
next step is to create shared folders. These
folders must have the capability to be used
and accessed by multiple people at a given
time or even at the same time
Test Plan
Review
I believe all the lack of internet connection was a massive hindrance. I couldn’t ensure that I was
using a WPA3 encryption because I couldn't get connected to the internet. Computer scans also
couldn’t be made since I couldn’t download antivirus to scan for flaws and viruses and there also
couldn't be scheduled security scans due to unavailability of antiviruses. There were no open ports
since 3389 port was blocked meaning the firewall was successfully configured. Logon
requirements were also met and it worked perfectly. And it was possible for staff to logon
successfully. Files could be accessed by staff and managers could also access files that staffs would
require permissions for. There were also no OS updates since there was no internet connection to
check for new updates.