Answer Posted / nimesh maru
Hardend the system ( does not matter which OS ) Run the
vulnerability test if possible, Install the necessary Patch
. Make sure you download the patch from the vendor site or
Trusted Location. Disable all unwanted services. Remove all
the unwanted users from the systems Profile. Have good Anti
virus software installed and make sure it is updated
regularly. Install a good Firewall software and even that
should be updated regularly. Install a good Malware,
spyware, adwareremover. Make sure u run the disk encryption
on the system. Disable access to cd rom/ dvd rom drives and
usb port. There are many more things to do but few have been
listed here.
Is This Answer Correct ? | 12 Yes | 1 No |
Post New Answer View All Answers
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What are all the technical steps involved when the data transmission from server via router?
How does phishing work?
Explain what are all the technical steps involved when the data transmission from server via router?
How do we do authentication with message digest(md5)?
What is the difference between cybersecurity and information security?
What are the possible ways of data exchange
What is network security?
What is network access control?
What is multicasting?
Explain what are digital signatures and smart cards?
Difference between the communication and transmission.
What is IPCONFIG command? Why it is used?
What is adware?
What is udp flood?