Any computer connected to the internet, as well as the computer server, is prone to a virus attack. There are extremely many viruses in circulation which may shut down the computer, delete data on it or even send data from the computer to the virus inventor. This paper discusses the importance of protecting Windows and Unix/ Linux servers from vulnerabilities and shortcomings. It will then discuss what measures can be taken to secure the network infrastructure and conclude by expressing the need to secure network infrastructure. It is essential to secure the network infrastructure from known vulnerabilities and shortcomings.
Importance of network security
With the increased globalization, computers play a very significant role in the day to day activities, which has been, improved by the use of the internet. It is vital to ascertain that while using the internet, the device connecting the computer is well maintained because connecting the computer to the internet means connecting it to numerous other networks out there (Ciampa, 2011). Although the internet links the computer to useful networks, it also exposes it to various shortcomings and vulnerabilities. A network security system is particularly prominent in network management. It is very important as it gives information and physical security to links, files, and paths in the computer. Network security is an action used to sense and stop the illegal usage of computers. It secures the computer against any shortcomings and vulnerabilities that may harm the computer thereby giving the computer a clean environment to work.
Measures to ensure network security
Viruses are very infectious, and they often seek to infect other computers as well. It will, therefore, take only a few seconds for any computer that is not protected to be vulnerable (Conklin & White, 2012). In order to avoid such situations from taking place, antivirus software should be purchased that is specifically intended for the server. In this case, the software should be suitable for Windows and Unix/Linux servers and should be able to shield the computer from macro viruses, Trojans, e-mail spam, and worms. It should also be able to update itself consequentially so as to tackle new threats. New information should be sought on a daily basis on the latest version of the antivirus software as new and stubborn viruses are created daily. The purchased antivirus software should be able to shield the computer from buffer overruns.
Even after installing the antivirus software, a lot of caution is needed to avoid compromising the server from shortcomings and vulnerabilities (Conklin & White, 2012). When a computer is in operation, it creates log files showing attempts of reaching its server, the communication demanded from it, and any other important information. Log files should not just be consulted when there is an issue, but regularly to ensure that any unwanted traffic is not allowed. Log analysis software and intrusion prevention software can be purchased to assist in the detection of hackers (Ciampa, 2011).
Computers are susceptible to attacks from outside and viruses if they are not protected. It is, therefore, vital to protecting Windows and Unix/Linux servers from such attacks. Without protection, information can be misused when servers are hacked. The intrusion of several viruses can also lead to the breakdown of the computer thereby wasting a lot of resources and time on repairs.
Ciampa, M. (2011). Security + guide to network security fundamentals. Boston, MA: Cengage Learning.
Conklin, W, M., & White, G. (2012). Principles of Computer Security CompTLA Security+ and Beyond. London: McGraw- Hill.