Verified Document

Network Defense Fundamentals Compare And Term Paper

This will help to improve monitoring and it will increase the ability to quickly identify threats while they are small. (Cole, 2006, pp. 3- 48) Step 4: Continuous monitoring. In this step there will be a focus on watching for any kind of threats. This is when a series of red flags will be used to identify and isolate threats early. If this kind of approach is utilized, it will help to minimize security breaches and their impact on the firm. (Cole, 2006, pp. 3- 48)

What is the reason you want to remove unused or unneeded services and protocols on your servers or PCs?

There are several reasons why unused / unneeded protocols should be removed to include: they can slowdown the computer and there is the possibility that spyware is attached to them. In the case of slowing down the computer, the added files will use up more memory. This will take longer for...

When these applications have been removed, the computer can be able to upload content quicker and deal with any kind issues more effectively. ("Why is My Computer Running Slow," 2012)
At the same time, unused / unneeded protocols can contain spyware. This remotely monitors the activities of the user without them knowing what is happening. Over the course of time, this will provide hackers with access to their log in information and passwords. Once this occurs, is when the data can be used to commit identity theft or fraud. ("Why is My Computer Running Slow," 2012)

References

Why is My Computer Running Slow. (2012). Norton. Retrieved from: http://www.norton-security-store.com/knowledge-center/computer-slow.html

Cole, E. (2006). Insider Threat. .Rockland, MA:…

Sources used in this document:
References

Why is My Computer Running Slow. (2012). Norton. Retrieved from: http://www.norton-security-store.com/knowledge-center/computer-slow.html

Cole, E. (2006). Insider Threat. .Rockland, MA: O'Reilly Media.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now