logo

IT Network Security Literature Review 2022

13 Pages2804 Words12 Views
   

Added on  2022-09-15

IT Network Security Literature Review 2022

   Added on 2022-09-15

ShareRelated Documents
IT 0
Network Security
IT Network Security Literature Review 2022_1
IT 1
Table of Contents
Part A.......................................................................................................................... 2
Literature review..................................................................................................... 2
ISO....................................................................................................................... 2
NIST...................................................................................................................... 2
COBIT................................................................................................................... 2
ETSI...................................................................................................................... 3
RFC....................................................................................................................... 3
Recommendation....................................................................................................... 3
Part B.......................................................................................................................... 4
Introduction............................................................................................................. 4
Variants of botnet.................................................................................................... 4
Botmaster............................................................................................................ 4
Zombies............................................................................................................... 4
Spamming and traffic monitoring.........................................................................5
Botnet architecture and operation..........................................................................5
Potential threats posed by a botnet........................................................................5
DDoS attack......................................................................................................... 6
Spamming............................................................................................................ 6
Phishing................................................................................................................ 6
Mitigation techniques.............................................................................................. 7
Install a windows firewall..................................................................................... 7
Update software regularly.................................................................................... 7
Network application targeted by botnet..................................................................7
Email program...................................................................................................... 7
Conclusion............................................................................................................... 8
References................................................................................................................. 9
IT Network Security Literature Review 2022_2
IT 2
Part A
Literature review
It is reported that there are numerous kinds of IT frameworks used by
companies including ISO, NIST, COBIT, ETSI, and RFC.
ISO
Evans highlighted that it is defined as an IS standard which is now used by
the companies to develop effective information security frameworks or
architectures to manage security risks [1]. It is an effective framework that
can help the business communities to determine the security vulnerabilities
and enhance the security of sensitive data. The strengths of ISO include
larger effectiveness, provide reliable services, and reduce security risks and
so on. However, the drawbacks of ISO include more complex to design,
require more costs and difficult to implement. The major nature of this
architecture is application-specific which is utilized in the companies for
security purposes.
NIST
Almuhammadi and Alsaleh highlighted that the NIST kind of framework
delivers a way to implement effective security policies and strategies in the
companies and enhance the level of privacy [2]. There are numerous
advantages of this framework including providing better solutions, helpful
for protecting sensitive data and more efficient. Numerous drawbacks of
NIST such as lack of experience, more expensive and require specific IT
budget. It is found that the nature of this architecture is categorized in the
specific application of the IS security.
COBIT
According to Durachman, et al., COBIT is a significant framework that can
be used as an approach for leading the privacy of computing devices and
data in the companies [3]. Such kind of framework is used in the companies
IT Network Security Literature Review 2022_3
IT 3
by implementing COBIT based strategies and policies. Advantages of COBIT
contain larger effectiveness, more capable to detect security risks and
deliver well-managed plans. Limitations of this framework include require
more efforts, not able to identify traffic signals and so on. Durachman, et al.,
reported that COBIT is categorized as an application-specific and
organizations use to enhance the privacy of data.
ETSI
Marra, et al., found that ETSI is mainly used for developing security
standards for ICT networks and allows companies to exchange data
effectively [4]. The benefits of this framework are larger appropriateness,
reduce cyber-crimes, easy to implement and so on. The drawbacks of this
framework are difficult to manage data handling issues, require IT
knowledge and so on. It is determined that ETSI can be categorized in
application-specific where companies adopt such frameworks.
RFC
Tan, et al., examined that RFC is a security framework utilized to design a
standard network protocol that helps companies to implement effective
network communications and manage cyber-attacks [5]. Numerous benefits
of RFC such as larger accessibility, enhanced security of data, reduced
security risks and so on. However, there are several drawbacks of this
framework like lack of experience, technical failures and lack of back-office
responses. It is highlighted that this framework has a specific application in
the area of information security where it helps to protect data from
criminals.
Recommendation
It is recommended that ISO framework should be used for small business,
school, home or offices due to their larger effectiveness to detect security
risks and provide effective security strategies by which data can be secured
from hackers [5].
IT Network Security Literature Review 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Frameworks and Reference Architectures Information 2022
|5
|926
|118

Computer Security: Elements, Issues, and Frameworks
|15
|5037
|1

Assignment on Cyber Defense in Web Based Attacks
|7
|1418
|22

Advance Computer Networks
|13
|2785
|408

Securing Internet of Things in 5G Era
|15
|3400
|363

Information Security | Task Report
|11
|2699
|24