Home 0P3N Blog The First Line of Defense to Consider
Ready to Start Your Career?
Create Free Account
prabesh8583 s profile image
By: prabesh8583
August 29, 2016

The First Line of Defense to Consider

By: prabesh8583
August 29, 2016
prabesh8583 s profile image
By: prabesh8583
August 29, 2016

We all are living in this computer era where data has been everything in our life. So this is the time where we cannot trust anyone. Anyone can plan and attack our system in order to steal our data. So we must have to be alert all the time. In order to be ready from these attacks, I have some mitigating measure that we should consider.

Monitoring of your system log

In computer, everything that happens in system environment is captured by different log. So we can review all that activities that took place on the network through it. We can monitor system log by going to the event viewer, you can have access to your event logs, your audit logs, your security logs and your access logs.

The event logs will let you know what’s transpired. The audit logs would also let you know what is taking place on the networks once changes are taking place. The security logs will let you know who had access to what, your access logs would also tell you have,  what access was successful, what access was denied.

Hardening the system

When we talk about hardening the system, it means changing any system out of its default settings. You are making that system much more secure and reliable. So some of the things we have to do is disable all the unnecessary services on the system. This way we can reduce vulnerability.

Protect management interfaces

In this I am referring to the control panel, control panel is the management interfaces of your system or say key of your system. Anyone without authentication can apply certain change your system. So we need to put in control policies to protect the use or access of management interfaces by others.

 Disable unnecessary accounts, on your systems, or on your local systems, your guest account

 Any accounts that are not in use, guest account, built in accounts, terminated accounts that you have on your networks, best practice you disable them. The essence of disabling them ensures that nobody can stumble upon them and use them maliciously.

Mac filtering

Limiting access to your network based on MAC address is called MAC filtering. You could list only on the access control list you could key in the numbers you want to allow or the numbers you don’t want to allow, that is the numbers you want to deny. If you limit access based on the MAC address you are said to be in MAC filtering.

 

802.1x

 It is a port based authentication standard to limit the use of rogue devices on our networks. Rogue devices, are devices that are not authorized to be on our network. Without 802.1x it is possible that somebody could bring in a router, connect it to the switch. But when you implement 802.1x it ensures that every device connecting to your network must authenticate. Your users must authenticate before they can pull the networks service.

So these are my some point that needs to be focus. Comment below if you anything to say.

 

 

 

Schedule Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry