The organization can disable remote access on the Windows desktop computers. When remote access is on, users can access their files over the internet. This act is dangerous for data security. For example, if one of the finance department employees uses another device to access files on one of his desk computers, he or she risks losing data to hackers. Log in tokens may be tracked over the Wi-Fi network, which can be used for backdoor login( Pektaş & Başaranoğlu, 2019). Turning off the remote access will help the company guard the data on various desktop computers.
Another security measure on Windows and Linux OS is to back up data on the cloud or separate hard drives. Running a logistics company involves regular transactions like invoice printing and cheque and receipt records. These data may be at risk when stored on a local computer. To curb data loss or corruption through physical damage or hacking, automatic backups need to be put in place. For example, applications that run on the Microsoft SQL server can be configured to run parallel database systems. This process allows the concurrent update of two databases in real time(Kuyumdzhiev & Nacheva, 2019). In case the files on the local database fail, the cloud or online database will power the company’s app. Also, daily backups need to be done by the IT team by uploading excel files to secure servers.
The company uses a Linux server locally; the admins need to deactivate network ports when not in use. Open ports are a crucial recipe for hacking. Malicious people may take advantage of the free internet ports and sabotage the company’s operations. Hackers may perform DDOS attacks by sending numerous requests to the server, which may slow it down(Miano et al., 2019). On many occasions, servers crash due to overload. Shutting down the unused ports minimizes the risk of attack hence securing computers.
Finally, encryption of data over the network using the security key in Linux should be implemented. Linux provides tools like GnuPG encryption used for web host services. This tool offers a protective layer to the data(Miano et al., 2019). When a user requests data from the server on the client-side, the GnuPG encryption tool generates a security token that accompanies the requested data. The copy of the token checks whether the user is authenticated and authorized to view the data. If the permissions are written, the data gets decrypted, and the user can perform CRUD operations depending on the level of access he or she has been granted.
This essay has been submitted by a student. This is not an example
of the work written by professional essay writers.
Uncategorized
Pssst… we can write an original essay just for you.
Any subject. Any type of essay. We’ll even meet a 3-hour deadline.
GET YOUR PRICEwriters online
Remember! This is just a sample.
Save time and get your custom paper from our expert writers
Get started in just 3 minutes
Sit back relax and leave the writing to us
Sit back relax and leave the writing to us
Sources and citations are provided
100% Plagiarism free
100% Plagiarism free