Order for this Custom Paper or similar Assignment Help Services

Fill the order form details in 3 easy steps - Instructions Guide .

Posted: June 15th, 2022

Microsoft Windows Computers Security

Microsoft Windows Computers Security
Microsoft Windows computers can be very useful by themselves, but they are far more effective when they are able to communicate with one another.
In an essay, address the following:
Discuss the techniques that many organizations use to ensure that their Windows networks are secure.
Additionally, examine how to connect computers together without risking your organization’s information to loss, alteration, or disclosure.
Provide an example of how each principle of the CIA triad can be used to secure the network.
Provide information from your
readings to support your statements.

Deliverables:
Your well-written essay should be 4-5 pages in length, not including the cover and reference pages.
Incorporating at least three academic sources.
Cite all sources using APA style, citing references as appropriate.
Use in text citations
All references must be from 2016 and above
Use diagram

Microsoft Windows Computers Security
Microsoft Windows computers are used in different functions and completing various tasks such as communication both at individual and organizational levels; thus, there is a need to make them more productive and secure. Microsoft Windows computers have revolutionized operation and execution of function through automation. This fact has made individuals and organizations across the consistently incorporate computers in the execution of different functions. Microsoft windows computers have graphical operation developed to enhance the execution of different functions. In this regard, the computers able to conduct different functions such as running software, storage of files, connection to the internet, watching videos, and listening to audios. Some of the functions implemented by the computers are posed with security threats and risks, thus making them vulnerable. In this regard, the different functions of the computers need to be secured from unauthorized access or malicious access, damage, and illegitimate uses. Consequently, computers that are connected are at risk of losing data, disclosure, and alteration of information or communication, and thus, security measures need to be adopted to secure the different operations. Moreover, the CIA trial principle needs to be adopted in securing the entire computer and network. Microsoft Windows computers are adopted in executing different functions through automation, but they are exposed to security threats and risks, and thus security measures and approaches need to be adopted to counter insecurity practices.
Techniques for securing windows network
Windows network security networks are exposed to security risks and threats, making them vulnerable, prompting the professionals to adopt different techniques to enhance security. Network security breaches result in irredeemable damages with losing millions of dollars; thus, there is a need to adopt relevant techniques to secure the network. First, organizations need to include monitor firewall performance software to counter attacks and breaches on the network (Singh and Chatterjee, 2017). The firewall software and hardware are modeled to block unauthorized access to network and computers. The firewall program introduces rules in the system and network to regulate the incoming and outgoing network traffic on the computer. The firewalls are enhanced by incorporating encryption tactics to protect data and information on transit. Therefore, firewall techniques are used to bar malicious or unauthorized access to the network.
Passwords are employed in every quarter related to the network to ensure that unauthorized access is prevented. In this regard, the users of the network need to have the appropriate credentials in the form of a password to have access to the network (Singh and Chatterjee, 2017). Unique [password is developed by the IT professionals and given to the different users, thus ensuring that the network is only accessed by the right parties. Additionally, the network and system are divided into different quarters in the interest of maintaining high-security standards. This fact ensures that every step or access to different quarters calls for the use of passwords to authorize access. More so, the password is changed and updated regularly by the IT professionals to ensure that they are not misused through issues such as identity theft. Therefore, the strict use and application of passwords in different quarters related to the networks greatly secure the network.
Organizations further develop and maintain antivirus software to counter any attacks or unauthorized access to the organizational network. Networks are exposed to a lot of cybersecurity risks from hackers across the globe. The hackers access the network by introducing viruses in the system and network. Consequently, the antivirus software needs to be consistently updated to employ the latest version in the software (Sari et al., 2017). This approach ensures that organizations and IT professionals are always ahead of the hackers and other cybercriminals. In addition to using antivirus software, the employees in other organizations need to be trained on different aspects of the attack on the network and precautions to take to prevent hackers from interfering with the network.
Secure connection of computers
Computers are connected via the internet to ensure that effectiveness in operating remote machines or conducting other vital activities; however, the connection introduces security risks and threats that need to be effectively eliminated. First, the organizations need to create a Virtual Private Network (VPN) to secure the connection and interaction between different computers. This technique is employed among workers working in a different location, such as homes away from organizational computers (Kolomoitcev and Bogatyrev, 2016). The connection between the computers ensures that workers can work the same way they would have worked while in the office while still at home. VPN ensures that workers can privately and securely access organizational systems, equipment, and network while at work, thus achieving a safe connection between computers.
The secure connection of computers can be achieved by the adoption of Privileged Access Management (PAM). PAM connection ensures that the users can create privileged or administrative accounts that they can use in accessing computers on the other end (Kolomoitcev and Bogatyrev, 2016). PAM techniques of connecting computers are modeled to achieve high levels of regulation and monitoring of the users by managing the identities, thus enhancing security operations. Moreover, PAM is incorporated with security features that include advanced credential security systems, credential obfuscation, user activity monitoring, and data access control. Therefore, PAM approach ensures that a secure connection between two computers is securely achieved.
Desktop sharing methodology is adopted in enhancing secure connections between different computers. The desktop sharing incorporates different applications that ensure real-time sharing of files, and presentations, webinars, and video conference (Wiss and Forsstrom, 2017). Security in the data sharing technique is achieved through adopting a strict authentication process to certify the credential and identity of the users of the computers. Additionally, encryption measures are incorporated to safeguard data and information transmitted from one computer to the other.
The CIA principles of Availability, Integrity, and confidentiality can effectively be adopted in achieving the security of the network. Confidentiality principle ensures that information and data are effectively hidden from unauthorized, thus enhancing the security and confidentiality of information and data (Nweke, 2017). For example, networks can be secured through the adoption of encryption and cryptography, thus achieving the confidentiality of network and data being transmitted from one computer to the other. Consequently, maintaining the integrity of the network is an effective approach to securing it. Network integrity ensures that the network remains accurate and uncompromised that maintaining its original identity. For instance, network integrity can be achieved by installation detection and anti-intrusion software to detect any alteration of the network. Additionally, the availability principle ensures that the network is readily accessible to the authorized parties. Security attacks on the network introduce inconveniences in the access to the network. Availability needs to be achieved by physically and virtually protecting the tools, resources, and equipment used in the connection.
Conclusion
Microsoft Windows computers have a wide range of uses that can be compromised by security threats and risks. The security risks need to be countered through different approaches, techniques, and best practices. The windows network needs to be secured through the installation of firewall software, the use of passwords, and antivirus software. Consequently, the safety in the connection of different computers needs to be enhanced through virtual private networks, Privileged Access Management, and a secured desktop sharing technique. Additionally, the CIA triad principle of confidentiality, integrity, and availability needs to be observed in protecting the network and computer system.

References
Kolomoitcev, V., & Bogatyrev, V. A. (2016, November). The fault-tolerant structure of multilevel secure access to the resources of the public network. In International Conference on Distributed Computer and Communication Networks (pp. 302-313). Springer, Cham.
Nweke, L. O. (2017). Using the CIA and AAA Models to Explain Cybersecurity Activities. PM World Journal, 6.
Sari, R. D., Supiyandi, A. P. U., Siahaan, M. M., & Ginting, R. B. (2017). A Review of IP and MAC Address Filtering in Wireless Network Security. Int. J. Sci. Res. Sci. Technol, 3(6), 470-473.
Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
Wiss, T., & Forsström, S. (2017). Performance Assessment of Secure CoAP and MQTT Communication on Resource-Constrained Devices. In the 13th Swedish National Computer Networking Workshop, Halmstad, May 29-30, 2017.

Order | Check Discount

Tags: best custom paper writing service, best nursing paper writing service, best nursing writing service, best paper writing services, help writing papers for college

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing Study Bay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00