Network Security and Data Communications
VerifiedAdded on 2023/04/21
|6
|1379
|191
AI Summary
This study material provides an in-depth understanding of network security and data communications. It discusses the vulnerabilities of organizations to cyber-attacks and provides recommendations for protection against ransomware. The material emphasizes the importance of antivirus and fire...
Read More
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORK SECURITY AND DATA COMMUNICATIONS 1
STUDENT ID:
NETWORK SECURITY AND DATA COMMUNICATIONS
By Student’s Name
Code + Course Name
Professor’s Name
University Name
City, State
Date
NETWORK SECURITY AND DATA COMMUNICATIONS 1
STUDENT ID:
STUDENT ID:
NETWORK SECURITY AND DATA COMMUNICATIONS
By Student’s Name
Code + Course Name
Professor’s Name
University Name
City, State
Date
NETWORK SECURITY AND DATA COMMUNICATIONS 1
STUDENT ID:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
NETWORK SECURITY AND DATA COMMUNICATIONS 2
STUDENT ID:
Contents
Introduction....................................................................................................................................3
Recommendation 1........................................................................................................................3
Recommendation 2........................................................................................................................3
Recommendation 3........................................................................................................................4
Recommendation 4........................................................................................................................4
Recommendation 5........................................................................................................................5
Conclusion......................................................................................................................................5
References.......................................................................................................................................6
NETWORK SECURITY AND DATA COMMUNICATIONS 2
STUDENT ID:
STUDENT ID:
Contents
Introduction....................................................................................................................................3
Recommendation 1........................................................................................................................3
Recommendation 2........................................................................................................................3
Recommendation 3........................................................................................................................4
Recommendation 4........................................................................................................................4
Recommendation 5........................................................................................................................5
Conclusion......................................................................................................................................5
References.......................................................................................................................................6
NETWORK SECURITY AND DATA COMMUNICATIONS 2
STUDENT ID:
NETWORK SECURITY AND DATA COMMUNICATIONS 3
STUDENT ID:
Introduction
In today’s cyberspace environment, there is no organization that is completely shielded
away from cyber-attacks. The cyber criminals are constantly coming up with new ways of
attacking the organization with each passing day. In the case of Zenith Stock Exchange, the
attack took place at the most vulnerable time when the company had not done a full update of the
company's network security software upgrade. Therefore, the company was hit very hard and the
hackers had their way because the only way that they released the data was by having the ransom
paid. The mistakes that occurred prior to the attack were grievous and they should not be allowed
to happen again for the sake of data security and for longevity of the company. The computer
security team has compiled this report as part the post-attack procedures necessary. The team
first does the audit of the attack and that will be presented in the PowerPoint presentation. After
which this report covers the possible recommendations that are to be implemented in case the
company is to overcome such an attack in the future. The recommendations needed are as
follows:
Recommendation 1
The first and most effective ways in avoiding and protecting an organization is by installing an
antivirus and a firewall. The two are very important because they are very important in ensuring
that there is control in what gets into a network system of the organization. Firewalls and the
antivirus are based on signatures (Mokle and Shaikh, 2017, p. 14). The signatures are the modern
techniques that have added a multifaceted approach to how networks add a line of defense
because they cover the loopholes and study and anticipate the behavior of ransom ware.
Therefore, as indicated in the PowerPoint presentation, the team highly recommends that the
organization must deploy some high-end commercial antivirus and firewall software
applications. The software applications must also be managed and monitored by a technician at
all times in case of any attempt of a ransomware attack or any other form of attack.
Recommendation 2
NETWORK SECURITY AND DATA COMMUNICATIONS 3
STUDENT ID:
STUDENT ID:
Introduction
In today’s cyberspace environment, there is no organization that is completely shielded
away from cyber-attacks. The cyber criminals are constantly coming up with new ways of
attacking the organization with each passing day. In the case of Zenith Stock Exchange, the
attack took place at the most vulnerable time when the company had not done a full update of the
company's network security software upgrade. Therefore, the company was hit very hard and the
hackers had their way because the only way that they released the data was by having the ransom
paid. The mistakes that occurred prior to the attack were grievous and they should not be allowed
to happen again for the sake of data security and for longevity of the company. The computer
security team has compiled this report as part the post-attack procedures necessary. The team
first does the audit of the attack and that will be presented in the PowerPoint presentation. After
which this report covers the possible recommendations that are to be implemented in case the
company is to overcome such an attack in the future. The recommendations needed are as
follows:
Recommendation 1
The first and most effective ways in avoiding and protecting an organization is by installing an
antivirus and a firewall. The two are very important because they are very important in ensuring
that there is control in what gets into a network system of the organization. Firewalls and the
antivirus are based on signatures (Mokle and Shaikh, 2017, p. 14). The signatures are the modern
techniques that have added a multifaceted approach to how networks add a line of defense
because they cover the loopholes and study and anticipate the behavior of ransom ware.
Therefore, as indicated in the PowerPoint presentation, the team highly recommends that the
organization must deploy some high-end commercial antivirus and firewall software
applications. The software applications must also be managed and monitored by a technician at
all times in case of any attempt of a ransomware attack or any other form of attack.
Recommendation 2
NETWORK SECURITY AND DATA COMMUNICATIONS 3
STUDENT ID:
NETWORK SECURITY AND DATA COMMUNICATIONS 4
STUDENT ID:
Secondly, the organization must involve the staff members in a form of security awareness
training that works towards giving them vital information on ways of avoiding ransomware
attacks. Here, the organization will warn the employees against opening links, attachments or
visiting sites that are prohibited by the firewalls installed. The employees are supposed to be
constantly reminded that they are the first line of defense because ransomware attacks are mostly
based on social engineering other than network based replication (Mokle and Shaikh, 2017, p.
23). In this we mean that most attackers using ransomware prefer tricking their targets with
seemingly genuine links, files, and websites or from other forms of ransomware entry points as
opposed to using hardcore hacking skills. In such attacks, sometimes the antivirus and firewall
software programs are not as effective as having the knowledge about these possibilities.
Therefore continued training of employees is a very effective technique that will save the
organization a lot of money and time if well rolled out and maintained.
Recommendation 3
The other very effective approach against ransomware attacks is having a very effective and
reliable data backup plan. As indicated in the presentation, data backup makes the data stolen
and put up for ransom useless to the perpetrators. The value of data that is only stored in one
storage point is very high. Nonetheless, if the perpetrators find that they are holding ransom data
that is of no use to the organization because the organization has a data backup that has similar
data then that is not very damaging. The data backup can be done on the cloud or in an offline
data storage point (Ruj, Stojmenovic, and Nayak, 2014, p. 17). Both are effective but each has its
own challenges to maintain and secure. Nevertheless, the organization needs to have any of these
backups as a failsafe and as a security measure.
Recommendation 4
The other most important and critical recommendation that Zenith should adopt is that of
ensuring that there is regular and well-coordinated patching. All the computers and end devices
must be regularly patched with the latest and the most up-to-date security software (Ruj,
Stojmenovic, and Nayak, 2014, p. 15). The patches are very critical because they ensure that the
hackers and other cyber criminals are not able to exploit the weaknesses in system based on
NETWORK SECURITY AND DATA COMMUNICATIONS 4
STUDENT ID:
STUDENT ID:
Secondly, the organization must involve the staff members in a form of security awareness
training that works towards giving them vital information on ways of avoiding ransomware
attacks. Here, the organization will warn the employees against opening links, attachments or
visiting sites that are prohibited by the firewalls installed. The employees are supposed to be
constantly reminded that they are the first line of defense because ransomware attacks are mostly
based on social engineering other than network based replication (Mokle and Shaikh, 2017, p.
23). In this we mean that most attackers using ransomware prefer tricking their targets with
seemingly genuine links, files, and websites or from other forms of ransomware entry points as
opposed to using hardcore hacking skills. In such attacks, sometimes the antivirus and firewall
software programs are not as effective as having the knowledge about these possibilities.
Therefore continued training of employees is a very effective technique that will save the
organization a lot of money and time if well rolled out and maintained.
Recommendation 3
The other very effective approach against ransomware attacks is having a very effective and
reliable data backup plan. As indicated in the presentation, data backup makes the data stolen
and put up for ransom useless to the perpetrators. The value of data that is only stored in one
storage point is very high. Nonetheless, if the perpetrators find that they are holding ransom data
that is of no use to the organization because the organization has a data backup that has similar
data then that is not very damaging. The data backup can be done on the cloud or in an offline
data storage point (Ruj, Stojmenovic, and Nayak, 2014, p. 17). Both are effective but each has its
own challenges to maintain and secure. Nevertheless, the organization needs to have any of these
backups as a failsafe and as a security measure.
Recommendation 4
The other most important and critical recommendation that Zenith should adopt is that of
ensuring that there is regular and well-coordinated patching. All the computers and end devices
must be regularly patched with the latest and the most up-to-date security software (Ruj,
Stojmenovic, and Nayak, 2014, p. 15). The patches are very critical because they ensure that the
hackers and other cyber criminals are not able to exploit the weaknesses in system based on
NETWORK SECURITY AND DATA COMMUNICATIONS 4
STUDENT ID:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
NETWORK SECURITY AND DATA COMMUNICATIONS 5
STUDENT ID:
some weakness in the system. As part of the regular maintenance, all security software and
hardware manufacturers make sure that they regularly come up software patches as part of the
regular maintenance of their appliance and applications. Zenith must constantly liaise with the
hardware and software providers as part of the general security precautionary measures.
Recommendation 5
The other most important precautionary measure that the security team highly recommends to
Zenith is the strict implementation of the Group Policy Object (GPO) restrictions. The
restrictions come in handy in case the hackers opt to use the social engineering option when
attacking the system (Ruj, Stojmenovic, and Nayak, 2014, p. 18). The GPO restrictions requires
the topmost members of the group to be person that have the highest knowledge about the
system. These persons in most computer networks are the network administrators. These are
experts who are knowledgeable about security and they have the relevant skills in averting
network and system attacks. They must be the persons that possess the login and access details
regarding the network and the entire information system.
Conclusion
Of course there are many other ways of preparing and avoiding a ransomware attack. Some of
the other effective ways include: GPO restrictions, restricting administrative rights, access
controls, performing data leakage prevention, configuring plugins and developing white list,
enabling unified threat management for edge devices, and so on. All these and many more
security and preventive measures are very important in ensuring that the organization is secure.
Almost all of them are based on the installation of antivirus and firewalls, access control and user
awareness and training. The three are discussed in the report and in the presentation they are well
covered. If all the recommendation are well implemented then the organization will avoid a
malware (ransomware) attack.
NETWORK SECURITY AND DATA COMMUNICATIONS 5
STUDENT ID:
STUDENT ID:
some weakness in the system. As part of the regular maintenance, all security software and
hardware manufacturers make sure that they regularly come up software patches as part of the
regular maintenance of their appliance and applications. Zenith must constantly liaise with the
hardware and software providers as part of the general security precautionary measures.
Recommendation 5
The other most important precautionary measure that the security team highly recommends to
Zenith is the strict implementation of the Group Policy Object (GPO) restrictions. The
restrictions come in handy in case the hackers opt to use the social engineering option when
attacking the system (Ruj, Stojmenovic, and Nayak, 2014, p. 18). The GPO restrictions requires
the topmost members of the group to be person that have the highest knowledge about the
system. These persons in most computer networks are the network administrators. These are
experts who are knowledgeable about security and they have the relevant skills in averting
network and system attacks. They must be the persons that possess the login and access details
regarding the network and the entire information system.
Conclusion
Of course there are many other ways of preparing and avoiding a ransomware attack. Some of
the other effective ways include: GPO restrictions, restricting administrative rights, access
controls, performing data leakage prevention, configuring plugins and developing white list,
enabling unified threat management for edge devices, and so on. All these and many more
security and preventive measures are very important in ensuring that the organization is secure.
Almost all of them are based on the installation of antivirus and firewalls, access control and user
awareness and training. The three are discussed in the report and in the presentation they are well
covered. If all the recommendation are well implemented then the organization will avoid a
malware (ransomware) attack.
NETWORK SECURITY AND DATA COMMUNICATIONS 5
STUDENT ID:
NETWORK SECURITY AND DATA COMMUNICATIONS 6
STUDENT ID:
References
Ruj, S., Stojmenovic, M. and Nayak, A., 2014. Decentralized access control with
anonymous authentication of data stored in clouds. IEEE transactions on parallel and
distributed systems, 25(2), pp.384-394.
Mokle, S. and Shaikh, N.F., 2017. Decentralized Access Control With Anonymous
Authentication for Secure Data Storage on Cloud. International Journal of Computer Science
and Information Security, 15(2), p.444.
TOTAL NUMBER OF WORDS: 1029
NETWORK SECURITY AND DATA COMMUNICATIONS 6
STUDENT ID:
STUDENT ID:
References
Ruj, S., Stojmenovic, M. and Nayak, A., 2014. Decentralized access control with
anonymous authentication of data stored in clouds. IEEE transactions on parallel and
distributed systems, 25(2), pp.384-394.
Mokle, S. and Shaikh, N.F., 2017. Decentralized Access Control With Anonymous
Authentication for Secure Data Storage on Cloud. International Journal of Computer Science
and Information Security, 15(2), p.444.
TOTAL NUMBER OF WORDS: 1029
NETWORK SECURITY AND DATA COMMUNICATIONS 6
STUDENT ID:
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.