15 Dec 2022

74

Best Practices for Securing Microsoft Windows Applications

Format: APA

Academic level: College

Paper type: Coursework

Words: 291

Pages: 1

Downloads: 0

With the changing dynamics of technology, applications have become insecure as they are exposed to malpractices such as hacking. In this regard, it is important for organizations to secure their applications, by making security an integral part of the organization’s security plan. Nowadays, the environment that most individuals think is secure, is not so secure unless the servers are hardened well ( Marshall et al., 2010) . Attackers are aware that servers store valuable information and programs that can be used to manipulate data. In this regard, a company will want to have a plan that foils assaults from the server and client levels. That plan starts with hardening the applications and making them as secure as possible. 

Keeping a system secure is a battle that never ends, and it is important for companies to keep monitoring their networks to ensure they are performing as expected. Though each company and each application is different, they all establish similar strategies to ensure that there are security controls that will foil attackers. To achieve this, an organization can adopt several practices. The first one is to ensure the hardening of the operating system. Hardening the OS involves configuring the operating system securely, creating policies and rules that govern the system, updating it and removing any unnecessary services and applications. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Other practices that a company can use include ascertaining sensitive files and protecting them using encryption, ensuring that distinctive domain user accounts are created for each user, and ensure that passwords are enforced for every user. Consequently, an organization should ensure that they create new user accounts that have limited permission and rights for services, and that they restrict any service to run as the domain user admin. In addition, Kerberos can be used to secure authentication, and firewalls can also be installed to create a DMZ ( Marshall et al., 2010) . Lastly, all Web servers, Internet-facing servers, as well as publicly accessible servers, should be placed in the DMZ. 

Reference 

Marshall, A., Howard, M., Bugher, G., Harden, B., Kaufman, C., Rues, M., & Bertocci, V. (2010). Security best practices for developing windows azure applications. Microsoft Corp , 42. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Best Practices for Securing Microsoft Windows Applications.
https://studybounty.com/best-practices-for-securing-microsoft-windows-applications-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration