Anda di halaman 1dari 4

Running head: WINDOWS SECURITY

WINDOWS SECURITY

Institutional affiliation

Student name

Date
WINDOWS SECURITY

I like your post, I would like to add some more details on your discussion. Your

discussion has provided substantial information regarding various security auditing in the

computer environment. I agree with the fact that auditing is the evaluation process which is

usually aimed at ensuring that objects meet the security standards, in finance auditing entails the

process of examining the financial records to establish whether they are accurate based on the

applicable rules (Pekkarinen,2018). I also concur with the fact that in the computer environment

auditing entails carrying out a comparison of configuration and performance information over

the standard or baseline security policy, the objective of carrying out auditing in a computer

environment is to ensure that the computer complies with the security policies. I also agree with

the fact that a Security baseline in a computer environment is simply a collection of security

settings. I also concur with the fact that in computer environment performance and configuration

is usually done through the log files (Villamarin & Cheng 2018).

The main importance of security audit is to ensure that the system complies with the

security standards, reducing the risk of unauthorized access to the system and also reduce data

breaches. In general security audit is very crucial in the computer environment is very crucial as

it enhances security within the system. Microsoft has been of great help in the computer

environment because it has provided Microsoft security compliance tool kit which is used to

acquire security baseline which is highly applicable in windows configuration Johansson,2016)It

provides several tools which are applied to security baselines for office as well as the windows.

References

Johansson, J. M. (2016). Windows server 2008 security resource kit.


WINDOWS SECURITY

Cheng, D. C., Villamarin, J. B., Cu, G., & Lim-Cheng, N. R. (2018). Towards end-to-end

Continuous Monitoring of Compliance Status Across Multiple

Requirements. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE

AND APPLICATIONS, 9(12), 456-466.

Pekkarinen, A. (2018). Enhancing the security of cloud services with Microsoft Enterprise

Mobility+ Security.

Question 2

I like your post, I would like to add some more details on your discussion. I will focus on

windows auditing and windows security. The reason as to why I choose to focus on these two

areas is because they the most common in the computer environment which is usually faced

with several problems ranging from intrusion to interference of the computer security systems. I

concur with the fact that windows auditing is all about the detection of changes within systems,

particularly the file systems, Active Directory, Exchange and SQL. Windows auditing is very

important because it helps organisations to reduce the risks of a data breach, this is usually

achieved through utilization of several auditing tools which help in the rollback of changes with

preferable configurations (Berghel, 2017). I concur with the fact that healthcare, financial and

government sector organization usually face threats and the reason is that they contain a lot of

data, which is very important. All organization strive to enhance data security and protect their

devices from any harm. All organization have a collection of security standards (Cartier &

Miltner 2016). A configuration setting is one of the main strategies, which is high recommended

by the baseline security group because they usually bring expertise in knowledge of partners,
WINDOWS SECURITY

customers from Microsoft. Various studies have shown that the rate of security threats have

continued to increase in the recent past. The policy makers have been able to combat the

increasing rate of security threats by regularly changing setting configurations so that they can

reduce the chances of having the most probable risks as well as data breaches (Karmel et al,

2015).

References

Berghel, H. (2017). A Quick Take on Windows Security Evolution. Computer, 50(5), 120-124.

Bestmann, M., Cartier, J., & Miltner, J. (2016). U.S. Patent No. 9,319,270. Washington, DC:

U.S. Patent and Trademark Office.

Luna, J., Suri, N., Iorga, M., & Karmel, A. (2015). Leveraging the potential of cloud security

service-level agreements through standards. IEEE Cloud Computing, 2(3), 32-40.

Anda mungkin juga menyukai