From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Updates and patches

Updates and patches

From the course: Ethical Hacking: Vulnerability Analysis

Start my 1-month free trial

Updates and patches

- [Instructor] On a local area network an operating system can be a vulnerable target. There are many threats that come from a number of different sources including hackers, malware, and phishing attacks. Hardening an operating system minimizes exposure to threats. Whether you're a network administrator, a security analyst, or even an end user, the following will provide guidelines on how to mitigate vulnerabilities on an operating system. There are several good practices. Use antivirus and antispyware protection and schedule daily automatic definition updates and scans. Secure email systems to minimize threats. Do not open any suspicious email attachments or respond to requests from unknown senders. Conduct periodic risk assessments to identify specific threats, and determine the effectiveness of security controls. Use strong passwords or passphrases for all user accounts. Disable any unneeded user accounts, and…

Contents