Most efforts to improve the security system more focused on servers, although many incidents caused by user errors caused by lack of desktop systems that ensure the safety of the users activity. Incidents "klikbca.com" viruses, trojans, and tapping the credit card number by keystroke-broadcast program indicates that the user side is the weakest link in the chain of security of a system. So also the existence of computer viruses that often cause system can not work properly, or even a computer virus able to work as a tapper tapper digital signature or other crucial data. Computer viruses or other malware attack many desktop users. So safe as safe-server system, it becomes meaningless when the desktop is used does not have good security and integrity. Secure Desktop is a work environment where users can work and perform activities with the support of adequate security. Secure desktop is expected to be able to handle and support the security of user activity that requires high security like doing data entry via the Internet. This is needed eg in banking applications for the desktop, or for the General Election (Election). Unfortunately often sistme operation and desktop systems are not so considered in designing a secure system is. To meet the concept of secure desktop then a few things to consider:
* The device peripherals are controlled (no CDROM, no floppy, serial and USB), making it difficult for users to freely enter the program without a definite control.
* Protected address space so that applications that do not have high access rights can not violate these limits.
* API which is safe.
* The structure of the file (filesystem) that is safe, for example equipped with encrypted file system.
By using well-coordinated system, the user can be set so that:
* Users can only use applications that are allowed. In other words, users or viruses that exploit a user's access rights can not install new applications.
* Users can only use the file space that is allowed.
* Users can not install or modify an existing program.
* Action can not destroy the integrity of user systems, eg the presence of the virus will not interfere with any other system or user.
The language used by programs to interact with the user also is very important because the security measures that should be understood clearly and vividly by the user, such as the SSL dialog box that is raised by a web browser, often ignored by users due to language barriers. On top of things enough to make the basis that the need to develop a desktop system that supports the user should the activities of security. Desktop security considerations of safe not only from the technical side but also from the side of users and organizations.
In general, the core of network security procedures in a company's responsibilities required of a person or team, who really pay attention to the overall course of networking. These teams have to really understand, about the security procedures
Manajemen Network And Administrasi Sistem (Network Security)
Diposting oleh Cyber Explore | 17.32 | Internet, Network | 0 komentar »
Langganan:
Posting Komentar (Atom)
0 komentar
Posting Komentar