logo

Network Security and Data Communications

   

Added on  2023-04-21

6 Pages1379 Words191 Views
NETWORK SECURITY AND DATA COMMUNICATIONS 1
STUDENT ID:
NETWORK SECURITY AND DATA COMMUNICATIONS
By Student’s Name
Code + Course Name
Professor’s Name
University Name
City, State
Date
NETWORK SECURITY AND DATA COMMUNICATIONS 1
STUDENT ID:

NETWORK SECURITY AND DATA COMMUNICATIONS 2
STUDENT ID:
Contents
Introduction....................................................................................................................................3
Recommendation 1........................................................................................................................3
Recommendation 2........................................................................................................................3
Recommendation 3........................................................................................................................4
Recommendation 4........................................................................................................................4
Recommendation 5........................................................................................................................5
Conclusion......................................................................................................................................5
References.......................................................................................................................................6
NETWORK SECURITY AND DATA COMMUNICATIONS 2
STUDENT ID:

NETWORK SECURITY AND DATA COMMUNICATIONS 3
STUDENT ID:
Introduction
In today’s cyberspace environment, there is no organization that is completely shielded
away from cyber-attacks. The cyber criminals are constantly coming up with new ways of
attacking the organization with each passing day. In the case of Zenith Stock Exchange, the
attack took place at the most vulnerable time when the company had not done a full update of the
company's network security software upgrade. Therefore, the company was hit very hard and the
hackers had their way because the only way that they released the data was by having the ransom
paid. The mistakes that occurred prior to the attack were grievous and they should not be allowed
to happen again for the sake of data security and for longevity of the company. The computer
security team has compiled this report as part the post-attack procedures necessary. The team
first does the audit of the attack and that will be presented in the PowerPoint presentation. After
which this report covers the possible recommendations that are to be implemented in case the
company is to overcome such an attack in the future. The recommendations needed are as
follows:
Recommendation 1
The first and most effective ways in avoiding and protecting an organization is by installing an
antivirus and a firewall. The two are very important because they are very important in ensuring
that there is control in what gets into a network system of the organization. Firewalls and the
antivirus are based on signatures (Mokle and Shaikh, 2017, p. 14). The signatures are the modern
techniques that have added a multifaceted approach to how networks add a line of defense
because they cover the loopholes and study and anticipate the behavior of ransom ware.
Therefore, as indicated in the PowerPoint presentation, the team highly recommends that the
organization must deploy some high-end commercial antivirus and firewall software
applications. The software applications must also be managed and monitored by a technician at
all times in case of any attempt of a ransomware attack or any other form of attack.
Recommendation 2
NETWORK SECURITY AND DATA COMMUNICATIONS 3
STUDENT ID:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware Attack Report: Zenith Stock Exchange
|15
|1137
|222

Computer Security Report 2022
|14
|3515
|48

Assignment on Ransomware and Cyber Security
|3
|419
|62

Cyber Computer Crime Assignment 2022
|4
|618
|17

Ransomware & Malware
|5
|581
|276

Network Requirements and Mitigation
|5
|854
|95