What are the Good practices to be followed for End Point Security?

Good Practices

As mentioned in my last post regarding end point security , in this blog we will be explaining about the good practices for end point security to be followed by a security architect :

Following are the good practices which can be followed and will keep your machine or system away from cyberattacks:

  • DNS configuration
  • Hased enabled password
  • SNMP protocol to SMNPv3
  • Certificate signed by CA
  • SSH connections
  • Logging
  • Configure Backup
  • Configure Software Rules
  • Device Policy
  • Script Control
  • Zones
  • Application Control
  • Device Management

We will be explaining the above recommendations in depth in our future blogs so keep yourself updated with our site by following us on our website or WordPress or other social network sites or contact us below:

We make Technology eazy via docs

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/  

Network Protocols the Formula One of IP Tracks

Network Protocol

Whenever a novice lands in a network domain, he or she gets tangled in the new technical jargons or abbreviations which are being widely used over the different topics of Network Technology.

Here we at DocTooLss try to break and simplify these topics, so that you all are able to understand these jargons and make our world a simple place to live in.

There is always a *conditions apply to everything then why to leave here too, “this blog is for those novice people like me, who have landed and are tangled in this bizzare world of network security/ technology”

So if you think we need to update or add more things or any other feedback, please do comment or mail us @ task.theme@gmail.com | Tweet us @doctoolss8 | Skype us doctools | website: https://doctoolss.com/home/

Find below the protocols used:

TELNET – It is a protocol which allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet server, in order to access a command-line interface. There is a drawback with it that no encryption technique is available with it and everything is sent in clear text which includes words.

SSH – It is also similar to a Telnet where a secure session is built, It is employed for doing things like running programs on remote systems, logging into systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection.

FTP – It transfer files between two machines, used by applications. As a program, it’s employed by users to perform file tasks by hand. FTP also allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones. There is a drawback with FTP that it can’t be used to execute remote files as a program.

TFTP – It is the version of FTP and is fast and eazy to use. It has no directory-browsing abilities i.e. it can only send and receive files.

HTTP – It is use to manage communication between web browsers and web servers and opens the right resource when you click a link.

HTTPS – It is sometimes known as Secure Hypertext Transfer Protocol. It uses Secure Socket Layer (SSL) which is also referred as SHTTP. It is the secure version of HTTP that shields you with shole security tools for keeping transactions between web browser and a server secure.

NTP – Network type Protocol that works by synchronizing devices to ensure that all computer systems are on the agree time.

DNS – Domain Name Server which converts the name of the sites to a IP address, ex- If you type http://www.google.com which will be converted into

DHCP – Dynamic Host Configuration Protocol that assigns to a host. It works well in small to very large network environment.

APIPA – Automatic Private IP Addressing – WS OS provide a feature called APIPA where clients can automatically self-configure an IP address and subnet mask.

TCP – Transmission Control Protocol it takes large blocks of information from an application and breaks them into segments.

UDP – User Datagram Protocol which basically scale down economy model of TCP and transports information that does’nt require reliable delivery.

ICMP – Internet Control Message Protocol – it is a management protocol and messaging service provider for IP working on network layer as per OSI model.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com | Facebook: https://www.facebook.com/DTdoctoolss/

Website Built with WordPress.com.

Up ↑

Create your website with WordPress.com
Get started