Saturday, 1 December 2012

How to Review Computer System Security


Proper reviews of a computer system's security are a must, regardless of whether you are in a home or business environment. Intruders will attack any vulnerable computer system, regardless of its purpose, and you must stay on top of security issues before they become threats. Fortunately, basic computer system security reviews are not difficult to perform, and the procedure can be standardized to both home and business users.

Items you will need

  • Administrator access
  • Internet access

Step 1

Begin by logging in to your computer with the Administrator account. Open the "Control Panel," and look in the "Users" section. Verify that the Guest Account is disabled and that no accounts have been created that should not be there. If you are on a server, check the "User Management" panel and verify that no unauthorized users have been added.

Step 2

Verify that you have an antivirus program installed and running. If not, install an antivirus program immediately (such as Avira AntiVir, AVG or Comodo Internet Security), and change its settings to run a scan every night, as well as performing live scanning whenever files are downloaded or accessed. You should also scan incoming email if you have email accounts on your computer. Do this same process for an antimalware program.

Step 3

Look at your firewall logs (if any) and see if there have been any intrusion attempts. Verify that the firewall is operational and that no rogue programs have been added to its allow list. If you do not have a firewall installed, install a software firewall on the computer (such as Comodo Internet Security or ZoneAlarm).

Step 4

If you have network monitoring software installed, check its logs, and ensure that no suspicious traffic has taken place on your network. Visually verifying that each hardware access point (Ethernet jack) onto your network is not being used by a third party is also a good way to verify your network security.

Step 5

Review your router logs, if applicable, and check to make sure that your wireless security is up to date. You should change your wireless encryption password often, and if you work for a company, ensure that it is changed whenever anyone leaves or is fired.

Step 6

Make sure that your computer systems are up to date with the latest security patches for your operating system and programs by using Windows Update or checking each program for updates.

No comments:

Post a Comment