Page 413 - StudyBook.pdf
P. 413
Infrastructure Security: Devices and Media • Chapter 6 397
The largest security concern in relation to workstations is the end user. End
users always have local access (the ability to work at the local console) to their
workstation, which can cause some big security problems, ranging from changing a
password to something a hacker can easily guess, to inadvertently opening e-mails
with viruses or Trojan horse applications running. Java viruses exploit weaknesses
inherent to the way that Web browsers and Java Virtual Machines (JVMs) allow Java
code to perform low-level functions on a system with very little security.
There will never be a foolproof solution to this security problem.The best way
to help deter issues like this is to train the end user. Having a formal security policy
(Chapter 12) in place specifying exactly what users can and cannot do with the
company’s workstation is also very important.
Locking down a user’s access to their workstation also helps.Windows work-
stations can have security policies applied that limit the user’s access to critical
system files.They also have the ability to install or run unauthorized software.
Using a well written and up-to-date virus protection application will help combat
the ability of an end user to overload a mail server or infect every system in the
company with a virus.
Another very important aspect of workstation security is to make sure that the
OSes or software applications always have the latest security patches in place.
Often a vendor will release security patches that address individual vulnerabilities
so technicians will be able to apply them faster, rather than having to wait for a
full service pack.
TEST DAY TIP
It is important to understand the differences between workstations and
servers. You should know that workstations are typically used by a single
local user and are designed to support fast front-end processing. Servers
are designed to support a large number of remote users and provide
fast back-end processing and file sharing.
Servers
Large, high-end computer systems with the capability of servicing requests from
multiple users simultaneously are called servers.These systems are the primary
sources on a network to which end users connect to receive or send e-mail, store
www.syngress.com