Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: September 23rd, 2022

Microsoft Windows Computers Security

Microsoft Windows Computers Security
Microsoft Windows computers can be very useful by themselves, but they are far more effective when they are able to communicate with one another.
In an essay, address the following:
Assignment help – Discuss the techniques that many organizations use to ensure that their Windows networks are secure.
Additionally, examine how to connect computers together without risking your organization’s information to loss, alteration, or disclosure.
Provide an example of how each principle of the CIA triad can be used to secure the network.
Provide information from your
readings to support your statements.

Deliverables:
Your well-written essay should be 4-5 pages in length, not including the cover and reference pages.
Incorporating at least three academic sources.
Cite all sources using Help write my thesis – APA style, citing references as appropriate.
Use in text citations
All references must be from 2016 and above
Use diagram

Microsoft Windows Computers Security
Microsoft Windows computers are used in different functions and completing various tasks such as communication both at individual and organizational levels; thus, there is a need to make them more productive and secure. Microsoft Windows computers have revolutionized operation and execution of function through automation. This fact has made individuals and organizations across the consistently incorporate computers in the execution of different functions. Microsoft windows computers have graphical operation developed to enhance the execution of different functions. In this regard, the computers able to conduct different functions such as running software, storage of files, connection to the internet, watching videos, and listening to audios. Some of the functions implemented by the computers are posed with security threats and risks, thus making them vulnerable. In this regard, the different functions of the computers need to be secured from unauthorized access or malicious access, damage, and illegitimate uses. Consequently, computers that are connected are at risk of losing data, disclosure, and alteration of information or communication, and thus, security measures need to be adopted to secure the different operations. Moreover, the CIA trial principle needs to be adopted in securing the entire computer and network. Microsoft Windows computers are adopted in executing different functions through automation, but they are exposed to security threats and risks, and thus security measures and approaches need to be adopted to counter insecurity practices.
Techniques for securing windows network
Windows network security networks are exposed to security risks and threats, making them vulnerable, prompting the professionals to adopt different techniques to enhance security. Network security breaches result in irredeemable damages with losing millions of dollars; thus, there is a need to adopt relevant techniques to secure the network. First, organizations need to include monitor firewall performance software to counter attacks and breaches on the network (Singh and Chatterjee, 2017). The firewall software and hardware are modeled to block unauthorized access to network and computers. The firewall program introduces rules in the system and network to regulate the incoming and outgoing network traffic on the computer. The firewalls are enhanced by incorporating encryption tactics to protect data and information on transit. Therefore, firewall techniques are used to bar malicious or unauthorized access to the network.
Passwords are employed in every quarter related to the network to ensure that unauthorized access is prevented. In this regard, the users of the network need to have the appropriate credentials in the form of a password to have access to the network (Singh and Chatterjee, 2017). Unique [password is developed by the IT professionals and given to the different users, thus ensuring that the network is only accessed by the right parties. Additionally, the network and system are divided into different quarters in the interest of maintaining high-security standards. This fact ensures that every step or access to different quarters calls for the use of passwords to authorize access. More so, the password is changed and updated regularly by the IT professionals to ensure that they are not misused through issues such as identity theft. Therefore, the strict use and application of passwords in different quarters related to the networks greatly secure the network.
Organizations further develop and maintain antivirus software to counter any attacks or unauthorized access to the organizational network. Networks are exposed to a lot of cybersecurity risks from hackers across the globe. The hackers access the network by introducing viruses in the system and network. Consequently, the antivirus software needs to be consistently updated to employ the latest version in the software (Sari et al., 2017). This approach ensures that organizations and IT professionals are always ahead of the hackers and other cybercriminals. In addition to using antivirus software, the employees in other organizations need to be trained on different aspects of the attack on the network and precautions to take to prevent hackers from interfering with the network.
Secure connection of computers
Computers are connected via the internet to ensure that effectiveness in operating remote machines or conducting other vital activities; however, the connection introduces security risks and threats that need to be effectively eliminated. First, the organizations need to create a Virtual Private Network (VPN) to secure the connection and interaction between different computers. This technique is employed among workers working in a different location, such as homes away from organizational computers (Kolomoitcev and Bogatyrev, 2016). The connection between the computers ensures that workers can work the same way they would have worked while in the office while still at home. VPN ensures that workers can privately and securely access organizational systems, equipment, and network while at work, thus achieving a safe connection between computers.
The secure connection of computers can be achieved by the adoption of Privileged Access Management (PAM). PAM connection ensures that the users can create privileged or administrative accounts that they can use in accessing computers on the other end (Kolomoitcev and Bogatyrev, 2016). PAM techniques of connecting computers are modeled to achieve high levels of regulation and monitoring of the users by managing the identities, thus enhancing security operations. Moreover, PAM is incorporated with security features that include advanced credential security systems, credential obfuscation, user activity monitoring, and data access control. Therefore, PAM approach ensures that a secure connection between two computers is securely achieved.
Desktop sharing methodology is adopted in enhancing secure connections between different computers. The desktop sharing incorporates different applications that ensure real-time sharing of files, and presentations, webinars, and video conference (Wiss and Forsstrom, 2017). Security in the data sharing technique is achieved through adopting a strict authentication process to certify the credential and identity of the users of the computers. Additionally, encryption measures are incorporated to safeguard data and information transmitted from one computer to the other.
The CIA principles of Availability, Integrity, and confidentiality can effectively be adopted in achieving the security of the network. Confidentiality principle ensures that information and data are effectively hidden from unauthorized, thus enhancing the security and confidentiality of information and data (Nweke, 2017). For example, networks can be secured through the adoption of encryption and cryptography, thus achieving the confidentiality of network and data being transmitted from one computer to the other. Consequently, maintaining the integrity of the network is an effective approach to securing it. Network integrity ensures that the network remains accurate and uncompromised that maintaining its original identity. For instance, network integrity can be achieved by installation detection and anti-intrusion software to detect any alteration of the network. Additionally, the availability principle ensures that the network is readily accessible to the authorized parties. Security attacks on the network introduce inconveniences in the access to the network. Availability needs to be achieved by physically and virtually protecting the tools, resources, and equipment used in the connection.
Conclusion
Microsoft Windows computers have a wide range of uses that can be compromised by security threats and risks. The security risks need to be countered through different approaches, techniques, and best practices. The windows network needs to be secured through the installation of firewall software, the use of passwords, and antivirus software. Consequently, the safety in the connection of different computers needs to be enhanced through virtual private networks, Privileged Access Management, and a secured desktop sharing technique. Additionally, the CIA triad principle of confidentiality, integrity, and availability needs to be observed in protecting the network and computer system.

References
Kolomoitcev, V., & Bogatyrev, V. A. (2016, November). The fault-tolerant structure of multilevel secure access to the resources of the public network. In International Conference on Distributed Computer and Communication Networks (pp. 302-313). Springer, Cham.
Nweke, L. O. (2017). Using the CIA and AAA Models to Explain Cybersecurity Activities. PM World Journal, 6.
Sari, R. D., Supiyandi, A. P. U., Siahaan, M. M., & Ginting, R. B. (2017). A Review of IP and MAC Address Filtering in Wireless Network Security. Int. J. Sci. Res. Sci. Technol, 3(6), 470-473.
Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
Wiss, T., & Forsström, S. (2017). Performance Evaluation of Secure CoAP and MQTT Communication on Resource-Constrained Devices. In the 13th Swedish National Computer Networking Workshop, Halmstad, May 29-30, 2017.

Order | Check Discount

Tags: Microsoft Windows Computers Security

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.