English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

this question is related to Operating system.

2006-10-02 19:41:34 · 4 answers · asked by ankit sharma 1 in Computers & Internet Security

4 answers

By leaps and bounds.

There is an OS running the network server as well as any other computer system. Handling security is the same concept for both.

You need to protect both, but for a network OS the scale is much exponentially larger and broader - more computers and programs to protect and repair if infected. Very complicated to learn and inplement network security. You will probably have to become an ethical hacker in order to keep ahead of the latest security technology breaches and innovations.

A consumer has one computer - or in my case - 5 computers on a network. A corporation might have thousands. The chance that you or me suffering a direct virus attack are miniscule, but corporate attacks by unethical hackers, warez, mail bombers, IRC bots, crackers, phreakers, and other unscrupulous viral programmers are relentless and ongoing. It is quite challenging to break into a corporate entity's network system for these people. IT departments will seldom divulge the amount of incidents that they are attacked, broached or compomised by a hacker.

Food for thought...
1. Security and complexity are often inversely proportional. Every step taken--whether it's vulnerability and risk assessment, security policy and procedure development, deployment of mechanisms or user education--should be as straightforward and simple as possible. The more cryptic the instructions and procedures, the more room for misunderstanding and misapplication.

2. Security and usability are often inversely proportional. There is no such thing as "complete security" in a usable system. Consequently, it's important to concentrate on reducing risk, but not waste resources trying to eliminate it completely. Such a pragmatic mind-set provides a fighting chance to achieve fairly good security while still allowing productivity.

3. Good security now is better than perfect security never. This is a corollary of the previous axiom, since perfect security doesn't exist in a usable system. Even if it were possible, a usable system is a moving target: Threats change, technologies change and business needs change. The job is never done.

This knowledge should actually free you to shoot for "good enough." Come up with 10 things to do, but only get to four of them now, and you're probably in a better position than if you wait until it's possible to do all 10. The key is to prioritize correctly.

4. A false sense of security is worse than a true sense of insecurity. Knowing where your enterprise is still insecure provides you with the framework for moving ahead. It's critical to know where you've left gaps, what documents and procedures are not quite right and what mechanisms need replacing. A false sense of security does not motivate improvement--or even analysis--of an organization's security posture. It leads to false complacency, which can give rise to disaster, often accompanied by the lament, "I thought we had that covered." It's better to know where you are weak and avoid unquantifiable risks.

5. Your security is only as strong as your weakest link. Therefore, be thorough in examinations and evaluations. For example, if there's a reason to employ VPNs (virtual private networks) to keep connections from home and remote offices to headquarters private, it may be necessary to protect that data while it resides on the notebook PCs of your mobile workforce. It may mean removing modems from desktop computers, requiring all traffic to flow through the firewall.

6. It is best to concentrate on known, probable threats. There are imagined threats, real threats and probable threats. And there are known and unknown threats. We are most interested in real and probable threats, while we continue to expand the set of known threats.

7. Security is an investment, not an expense. The challenge is to get this point across to upper management. Investing in computer and network security measures that meet changing business requirements and risks makes it possible to satisfy changing business requirements without hurting the business' viability. Properly secured servers let corporate information be shared with salespeople in the field and with business partners. Improperly configured systems lead to data loss or worse.

2006-10-02 19:47:34 · answer #1 · answered by maewestfan 3 · 2 1

2

2016-08-25 04:30:17 · answer #2 · answered by Beatrice 3 · 0 0

There is so many differences B/W network and O/S security. Network security in done by server area & O/S Security is part of any computer running software means Operating system security is an unusual part of the computer. in the O/S Security it can handle the protection of computer as login & password, user access to his/her data etc...
But network security works for basically an internet area who can protect your system from any types of unwanted material likes Emails, Web browsing websites, Wirus, data accessing for any computer. from network server there are so many computer systems are connected.

2015-05-05 20:42:57 · answer #3 · answered by Jacob Singh 3 · 0 0

O/S security means. O/S based login & password security, i.e securing computer and its data physically or locally. stopping unauthorized person to access data locally.
O/S also handle user level security i.e. only relevant user can access his/her data and nobody else.

Network Security means.. securing the machine or data while accessing it remotely. Stopping the unuthorized person to access data remotely. e.g firewall.

2006-10-02 19:59:05 · answer #4 · answered by Tejash 3 · 1 0

fedest.com, questions and answers