logo

Mission-Critical Components of a LAN | Study

The assignment involves analyzing a network breach and cyberattack against financial service institutions, and providing situational awareness, threat intelligence, and risk response actions.

19 Pages3346 Words30 Views
   

Added on  2022-08-24

Mission-Critical Components of a LAN | Study

The assignment involves analyzing a network breach and cyberattack against financial service institutions, and providing situational awareness, threat intelligence, and risk response actions.

   Added on 2022-08-24

ShareRelated Documents
Running head: CST 610 9043 Cyberspace and Cyber security Foundation
CST 610 9043 Cyberspace and Cyber security Foundation
Name of the Student
Name of the University
Author Note
Mission-Critical Components of a LAN | Study_1
CST 610 9043 Cyberspace and Cyber security Foundation 1
Table of Contents
Introduction:...............................................................................................................................3
Assess suspicious activity:.........................................................................................................3
Mission critical systems:........................................................................................................3
Perimeter router:.................................................................................................................4
DMZ:..................................................................................................................................5
DNS server:........................................................................................................................6
Web server:........................................................................................................................8
Email server:....................................................................................................................10
Central switches:..............................................................................................................11
Network security:.................................................................................................................11
Penetration testing:...............................................................................................................11
The Financial Sector:...............................................................................................................13
Unencrypted data:................................................................................................................14
New automation technology without Security:....................................................................14
Unprotected Third Party Services:.......................................................................................15
Unsecured Mobile banking:.................................................................................................15
A constantly changing threat landscape:..............................................................................15
Financial services information sharing and analysis centre:....................................................15
Industrial control systems:.......................................................................................................16
Mission-Critical Components of a LAN | Study_2
CST 610 9043 Cyberspace and Cyber security Foundation 2
Supervisory Control and Data Acquisition (SCADA):........................................................16
Distributed Control System (DCS):.....................................................................................16
Actual ICS implementation:.................................................................................................16
Conclusion:..............................................................................................................................17
References:...............................................................................................................................17
Mission-Critical Components of a LAN | Study_3
CST 610 9043 Cyberspace and Cyber security Foundation 3
Introduction:
The United States critical infrastructure: water, power, natural gas and oil, financial
systems, military systems have become the target of physical and cyber attacks as much more
complex system frameworks are integrated with the web as well as with some of the other
control systems that are digital. The network security stands for all of the procedures and
policies which is used by a network administrator for mitigating the risks that can come to a
network. It includes policies for recording and finding a possible breach and policies that is
needed to make response to the events (Perlman, Kaufman & Speciner, 2016). An enacted
and well written network security effort will make response to the variety of threats. The
threats can include malicious codes, direct attacks and internal threats. In the computer
security, the threat is basically a possible danger which is able to exploit a vulnerability to the
security breach as well as therefore it can be reason for the possible harm. The purpose of this
paper is to provide situational awareness about the present security breach as well as cyber
attacks that is against various financial service institution.
Assess suspicious activity:
The financial world is littered with the organisations which have paid huge amount of
fines for the failures of them around the AML (anti money laundering) legislation.
Mission critical systems:
The mission critical system is basically a name for a system which is having functions
that are very much critical as well as complex to the survival of an institution. The systems
are required for the basic day to day operations in most of the cases. The time when the
systems fail or the communications with the other systems are blocked then the business may
suffer for a set back that is serious.
Mission-Critical Components of a LAN | Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CST 610 9043 Cyberspace and Cyber security Foundation
|11
|792
|22

Law Enforcement - Cyber Security | Paper
|12
|2145
|20

Network Design Proposal for XYZ Retails
|15
|873
|395

Cyber Security Prevention and Detection
|9
|1711
|42

Cyber Security Improvement Plan Proposal
|5
|928
|93

Information System Security: Threats and Solutions for Google Company
|19
|4845
|128