Wednesday, October 30, 2019

Enhancing Security in System Administration Assignment

Enhancing Security in System Administration - Assignment Example Contextually, it can be affirmed that an operating system is usually viewed to be one of the major fundamental aspects concerning improving the security of every computing system by a considerable level. It can be argued in this similar regard that secured programs require safe operating system and ignorance of this may lead to failure. In other words, operating systems must be capable of ensuring effective execution of various programs as well as mechanisms effectively and most vitally enabling high performance use of various computer resources. Ensuring secure performance of all operational processes largely relies on accurate implementation of different hardware resources and scheduling mechanisms (Jaeger, 2008). Specially mentioning, the security threats associated with various system administrators are recently receiving increasing attention driven by series of events resulting in significant damage due to security threats. The primary challenges related with system administrato r can be attributed by taking into concern certain significant aspects like security and manageability. In practice, operating systems require various tasks that need to be executed in order to make sure that the system operations impose extensive impact on sensitive user data and process. For instance, adding and removing various software systems and drivers may result in causing the user data to be at risk through corruption, leakages and losses (Scarfone, Janseen & Tracy, 2012).) With this concern, the primary purpose of this paper is to develop, document and assess best practices for server deployment and administration that would eventually support and enhance the security of Megacorp towards upgrading its new operating system. 1. Enhancing Security a. Before Server Deployments Deployment of servers in any organization is costly and daunting. The servers provide broad array of services to internal as well as external users and stores along with delivers different sensitive info rmation to the organizations. Moreover, servers are frequently introduced by the intruders in order to gain unauthorized access of valuable data and other services. There exist certain few common threats to servers that have been represented below: Malicious objects may use software bugs in the server or its operating system in order to gain unofficial access to the server Denial of service (DoS) might also be directed to secondary network infrastructure, deterring the valid users to execute the server services Sensitive information stored in the main server may get access by the intruders or may change in an unauthorized manner Sensitive data or information that are transferred or encrypted amid the servers and thus the client may get interrupted by unauthorized users. Correspondingly, it can be admitted that it is often more difficult to address the security of servers after the deployment or the implementation of effective operation systems. Thus, security should be prudently mea sured from the preliminary stage of planning. It is essential to make effective decisions about determining the configurations of various information systems appropriately and consistently in order to ensure effective outcome of the deployment plan. It has been ascertained that organizations often fail to address dissimilar human resource associated

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.