Answer Posted / nimesh maru
Hardend the system ( does not matter which OS ) Run the
vulnerability test if possible, Install the necessary Patch
. Make sure you download the patch from the vendor site or
Trusted Location. Disable all unwanted services. Remove all
the unwanted users from the systems Profile. Have good Anti
virus software installed and make sure it is updated
regularly. Install a good Firewall software and even that
should be updated regularly. Install a good Malware,
spyware, adwareremover. Make sure u run the disk encryption
on the system. Disable access to cd rom/ dvd rom drives and
usb port. There are many more things to do but few have been
listed here.
| Is This Answer Correct ? | 12 Yes | 1 No |
Post New Answer View All Answers
How to implement PIX firewall security?
How does dlp work?
What are the different type of networking / internetworking devices
What is difference between discretionary access control and mandatory access control?
What are manageable and non manageable switches?
What are the different types of vpns?
What is the difference between arp & rarp?
What is difference between baseband and broadband transmission
What is threat-focused ngfw?
Explain how do we use rsa for both authentication and secrecy?
What is intrusion prevention systems (ips)?
Difference between bit rate and baud rate.
What is proxy firewall?
What are the data units at different layers of the TCP / IP protocol suite
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?