The First Line of Defense to Consider

August 29, 2016 | Views: 2933

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

We all are living in this computer era where data has been everything in our life. So this is the time where we cannot trust anyone. Anyone can plan and attack our system in order to steal our data. So we must have to be alert all the time. In order to be ready from these attacks, I have some mitigating measure that we should consider.

Monitoring of your system log

In computer, everything that happens in system environment is captured by different log. So we can review all that activities that took place on the network through it. We can monitor system log by going to the event viewer, you can have access to your event logs, your audit logs, your security logs and your access logs.

The event logs will let you know what’s transpired. The audit logs would also let you know what is taking place on the networks once changes are taking place. The security logs will let you know who had access to what, your access logs would also tell you have,  what access was successful, what access was denied.

Hardening the system

When we talk about hardening the system, it means changing any system out of its default settings. You are making that system much more secure and reliable. So some of the things we have to do is disable all the unnecessary services on the system. This way we can reduce vulnerability.

Protect management interfaces

In this I am referring to the control panel, control panel is the management interfaces of your system or say key of your system. Anyone without authentication can apply certain change your system. So we need to put in control policies to protect the use or access of management interfaces by others.

 Disable unnecessary accounts, on your systems, or on your local systems, your guest account

 Any accounts that are not in use, guest account, built in accounts, terminated accounts that you have on your networks, best practice you disable them. The essence of disabling them ensures that nobody can stumble upon them and use them maliciously.

Mac filtering

Limiting access to your network based on MAC address is called MAC filtering. You could list only on the access control list you could key in the numbers you want to allow or the numbers you don’t want to allow, that is the numbers you want to deny. If you limit access based on the MAC address you are said to be in MAC filtering.



 It is a port based authentication standard to limit the use of rogue devices on our networks. Rogue devices, are devices that are not authorized to be on our network. Without 802.1x it is possible that somebody could bring in a router, connect it to the switch. But when you implement 802.1x it ensures that every device connecting to your network must authenticate. Your users must authenticate before they can pull the networks service.

So these are my some point that needs to be focus. Comment below if you anything to say.




Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Thanks for sharing your knowledge with us, you know with togetherness we may overcome the fear/know our stuff.With unity and sharing Ideas,but what about the “Firewall and proxy” or the physical aspect of securing eg Security guard,Alarm,Lightning and also Restriction of the entire Area etc.

  2. Hi,
    Any hardening guides for Windows and Linux to share?

  3. Good Artcile

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?