To secure servers, all unnecessary services and resources have to be disable and removed. The more software running on an operation system, the more ports are open [3]. This creates passages for attacks to occur. Least privileges should assigned to any network service. It should also be assigned to any random user that needs to access the hospitals website and database. All of the hospitals log files should be checked and saved in a separate and safe database. The log files give good detail of an attack or an attack attempt, if any. If anything suspicious is noted on the hospitals’ log files, an investigation should commence immediately. All application extensions and unused modules should be disabled and removed. When dealing with servers, a very good thing to do is to scan the server. This is a detection method that helps and aims to keep the hospital’s network safe from any suspicious activity. There are also web servers and file …show more content…
The hospital possesses multiple file servers which store very valuable information. There are some steps that can be taken to harden and keep these servers safe from any form of unauthorized access. The file server needs to be physically secure and all drives need to be encrypted. BitLocker can be used to encrypt the drives in the hospital [6]. It makes sure that files are secure even if they were stolen and confidentiality of patients and staff of the hospital are safe. The file server should not be on the internet often either. A firewall can be used to restrict access from outside the LAN. The file sever should constantly be updated and an active antivirus should be installed. It is important that the hospital stops the use of all unnecessary services and software. File access needs to be controlled and logged such that every use of the file server is known and any suspicious traits can be traced. Auditing should be set up which will monitor who reads, write and delete files. To this, in a folders properties, the security tab is clicked and “Auditing” under the advanced options is enabled. The mechanism of least privileges can also be used for file