1,308
15
Essay, 2 pages (300 words)

Wifi, vpns & encryption

WiFi, VPNs and Encryption WiFi, VPNs and Encryption Affiliation In the past few years, there have emerged a wide variety of security attacks such as viruses, worms and so many other types of security threats. Though, there are also a number of ways to deal with these threats but there is not a single perfect solution to completely avoid these threats. Once a computer or a server has been infected with these viruses, it is necessary for the administrator to use the mechanism of least privileges in order to complete their tasks. Basically, this mechanism allows the system users to run their processes using the minimum privileges required to complete the users processes. In this scenario, different restrictions are implemented on the system access mechanisms. As a result, it becomes very difficult for these security threats to pollute a system and spread to other systems and devices (Merrifield, 2015). In other words, the concept of least privileges is used by the system administrators to offer the smallest amount of system resources needed to complete important business tasks. This mechanism is implemented through a variety of methods such as user rights (for instance putting restrictions to users’ rights, the way they access to the systems), resource permissions for instance implementing restrictions on CPU, network, memory and file system permissions. For instance, if a middleware system simply needs access to the network, the capability to write to a log, and read access to a database table, it refers to all the authorizations that should be approved. However, the middleware server should not be granted administrative privileges in any case under any circumstances (OWASP, 2015).
References
Merrifield, J. (2015). Using a Least-Privileged User Account. Retrieved from Microsoft. com: https://technet. microsoft. com/en-us/library/cc700846. aspx
OWASP. (2015, March 05). Secure Coding Principles. Retrieved from https://www. owasp. org/index. php/Secure_Coding_Principles

Thank's for Your Vote!
Wifi, vpns & encryption. Page 1
Wifi, vpns & encryption. Page 2
Wifi, vpns & encryption. Page 3

This work, titled "Wifi, vpns & encryption" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Wifi, vpns & encryption'. 15 September.

Reference

AssignBuster. (2022, September 15). Wifi, vpns & encryption. Retrieved from https://assignbuster.com/wifi-vpns-encryption/

References

AssignBuster. 2022. "Wifi, vpns & encryption." September 15, 2022. https://assignbuster.com/wifi-vpns-encryption/.

1. AssignBuster. "Wifi, vpns & encryption." September 15, 2022. https://assignbuster.com/wifi-vpns-encryption/.


Bibliography


AssignBuster. "Wifi, vpns & encryption." September 15, 2022. https://assignbuster.com/wifi-vpns-encryption/.

Work Cited

"Wifi, vpns & encryption." AssignBuster, 15 Sept. 2022, assignbuster.com/wifi-vpns-encryption/.

Get in Touch

Please, let us know if you have any ideas on improving Wifi, vpns & encryption, or our service. We will be happy to hear what you think: [email protected]