LAB 2 Assignment #2
Microsoft Environment Analysis
Back up your Data: It's important that you regularly archive your documents, folders, and settings so that you can retrieve the data if your laptop is stolen or the hard disk fails. How often you should back up your files depends on the number of files you create, how often you create them, and how often you change them. If you create files every day, you might want to back them up weekly or even daily. You can back up your data to a CD or DVD, a USB flash drive, or another computer if your laptop is on a network. It's best to schedule regular, automatic backups that run even while you're working on your laptop.
Data Encryption: helps defend against misuse of information if your computer is stolen. Data encryption scrambles the contents of a message or file so that it can be read ...view middle of the document...
Never leave a laptop in an unlocked room, even if you think that the room is secure.
Microsoft has spent a ton of time and effort to make the firewall that comes with the operating system a valid solution for helping secure the endpoint. Everyone that has installed or obtained Windows Vista or Windows 7 already has the firewall running, as the firewall is installed and enabled by default. The default Windows firewall comes with only the required applications, ports, and services supported to get the endpoint running on the network. For most organizations this might not suffice to solve your complete endpoint firewall security needs, but it is a great place to start. Most organizations will find that they need to alter some of the firewall settings that are default in Windows 7, but altering these settings is easy. The firewall settings can be managed in a few different ways with Windows 7 endpoints. First, you can alter them manually on each endpoint that needs to be modified. This is done in the Windows Firewall applet within the Control Panel. Another option that provides for more granular control of the firewall is to use the Windows Firewall w/ Advanced Security.
A network is two or more computers and/or network devices (e.g., printer, switch, hub, router) connected to the Internet or a LAN. Because the Windows 2000 or higher server is connected to the Internet or to a local or wide area network, the emphasis for securing the data on this server is placed on physical security of the server, controlling access to the data, and protecting the data from unauthorized access across the wire.