eComputerBay

Computer Bay
Login | Register Build Your PC
Build UR PC  
New Used Refurbished
 USD ($)    Skype Connection    Skype Connection
Buy, Sell & Promote Computers World Over

Product Search Bar

  Computer Dictionary : System Hardening
 

Welcome to the eComputer Bay's Computer Dictionary - the free online dictionary of computer and technology terms. The goal of the Computer Dictionary is to not just define computer terms, but explain them as well.

Definitions of computer terms are helpful, but explanations with examples are even better. eComputer Bay contains hundreds of computer and technology terms, all with detailed explanations.

Use the Search Bar Below To Get Computer Definations And To Check out All the Terms Simply leave the Computer Term Blank...-



Computer Term

1. System Hardening

Most computers offer network security features to limit outside access to the system. Software such as antivirus programs and spyware blockers prevent malicious software from running on the machine. Yet, even with these security measures in place, computers are often still vulnerable to outside access. System hardening, also called Operating System hardening, helps minimize these security vulnerabilities.

The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing all non-essential software programs and utilities from the computer. While these programs may offer useful features to the user, if they provide "back-door" access to the system, they must be removed during system hardening.

Advanced system hardening may involve reformatting the hard disk and only installing the bare necessities that the computer needs to function. The CD drive is listed as the first boot device, which enables the computer to start from a CD or DVD if needed. File and print sharing are turned off if not absolutely necessary and TCP/IP is often the only protocol installed. The guest account is disabled, the administrator account is renamed, and secure passwords are created for all user logins. Auditing is enabled to monitor unauthorized access attempts.

While these steps are often part of operating system hardening, system administrators may choose to perform other tasks that boost system security. While both Macintosh and Windows operating systems can be hardened, system hardening is more often done on Windows machines, since they are more likely to have their security compromised.



 
 



Free Online Computer Dictionary

Copyright © eComputerBay.com All rights reserved. Reproduction in whole
or in part in any form or medium without written permission is prohibited.
Usage of this web site is subject to terms and conditions.
eComputerBay on
© eComputerBay - (2007-2019)