Introducing Desktop Security
The Desktop Security Policy is downloaded by the Security Management server to a Policy Server, a module installed on a Security Gateway, which serves as a repository for the Desktop Security Policy. Client machines download their Desktop Security Policies from the Policy Server.
When a client connects to the organization’s Security Gateway to establish a VPN, it can connect to a Policy Server as well and retrieve its Desktop Security Policy and begin enforcing it. Clients can accept, encrypt or drop connections depending on their Source, Destination, and Service.
Information technology security is like an onion whose layers protect computer users from hackers. If a computer is not protected at the personal level, it could allow a hacker to send thousands of illicit e-mails and cause you to lose your network access. You can protect yourself from the average desktop hacker by being aware of some of their common tactics.
The Need for Desktop Security
A Security Gateway protects a network by enforcing a Security Policy on the traffic to and from that network that passes through the Security Gateway. A remote client, located outside the protected network, is vulnerable to attack because traffic to the remote client does not pass through the Security Gateway — no Security Policy is enforced on this traffic.
There is a further danger: an attacker might gain access to a protected network by compromising a remote client, which may in turn compromise the protected network (for example, by relaying a virus through the VPN tunnel). Even if the Security Gateway enforces a very restrictive Security Policy, the LAN remains vulnerable to attacks routed through unprotected remote clients.
Why do you need to secure your Desktop?
We need to secure our desktop because a personal computer used without proper security measure that could lead to exploiting the system for illegal activities using the resources of such insecure computers. These exploiters could be Virus, Trojans, Keyloggers and sometimes real hackers. This may result in data theft, data loss, personal information disclosure, stealing of credentials like passwords etc.
Basic Steps TO SECURE YOUR DESKTOP
-
Keep operating system patches up to date
-
Use encryption to securely encode sensitive information
-
Install antivirus software; configure for daily updates
-
Install and configure a personal firewall
-
Keep application and software patches up to date (e.g., Microsoft Office, browsers, etc.)
-
Follow best practices when opening email attachments
-
Follow secure password policies
-
Follow best practices for user account security
-
Eliminate unnecessary network services, applications, and processes
-
Avoid peer-‐to peer file sharing
-
Install and configure anti-Spyware programs
-
Configure system restore points to protect your current configuration
-
Perform regularly scheduled backups to protect data
-
Turn off computer when not in use; restrict physical access to computer
Things to remember while using your personal computer
- Always install Licensed Software so that you have regular updates of
your Operating system and Applications. In case of open source
software, make sure to update frequently. - Read the “Terms and Conditions” / “License Agreement” provided by
vendor/software before installation. - Properly shutdown and switch off your personal computer after the
use along with your external devices like Monitor, Modem,
Speakers etc.