logo

Network Security Threats and Control Measures for Open University Malaysia

   

Added on  2023-01-19

10 Pages3121 Words88 Views
NETWORK SECURITY
Network Security Threats and Control Measures for Open University Malaysia_1
Table of Contents
INTRODUCTION...........................................................................................................................1
Overview of security needs of OUM ..........................................................................................1
External network attacks .............................................................................................................1
Types of External Attacks............................................................................................................2
Internal Attacks............................................................................................................................3
Types of Internal Attack..............................................................................................................3
Control Against Network.............................................................................................................4
Preventive method for Cyber Attack...........................................................................................5
Detective Control ........................................................................................................................6
Corrective Control.......................................................................................................................6
Key Approaches for Cyber Security................................................................................................6
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
Network Security Threats and Control Measures for Open University Malaysia_2
INTRODUCTION
Network security is defined as the approach used to protect the integrity and usability of
the networking services and data. Cyber attack is one of the most alarming threat to the network
security and thus it is very essential to adopt suitable measures for providing network security
(AbdAllah, Hassanein and Zulkernine, 2015). In the era of information technology when all
operational activities of organisations are performed via networking services. Open University
Malaysia (OUM) is planning to open its three new learning centres. However, in the wake of
recently faced cyber attacks university is having concern for improving its network security for
existing as well as new learning centres. The report will discuss the network security threats
which may be experienced by OUM and the security and control measures which can be helpful
for the university.
Overview of security needs of OUM
The biggest networking threat for the OUM is data breach and malicious threats. The
existing threats make the network system of university highly vulnerable for the unauthorised
access and data breach. The malicious threats such as virus, trozen horses, spyware and adware
can also affect the hardware in addition to the software. Thus along with the network security
and maintenance cost OUM is also required to protect its internal data which consist of
information related to students, teachers and other sensitive information of organisation. Thus
there is need of security measures which can prevent these threats and better network
performance to university.
External network attacks
The malicious campaign and threat actions that are conducted form the outside of the
organization and attack the surface that exist outside the firewall. This attacks are well
coordinated and well executed by skilled and sophisticated hackers. In external attacks hackers
try to find the vulnerability of network and penetrate it. These kinds of attack can cause major
damage to organization and harm and misuse their information and data.
External attack can be considered as method, process and acts that are performed by
unauthorised entity to compromise the security and privacy of network or data base of host. This
action are performed by network attacker, hackers and crackers. These are some conditions that
can be consider as external attack- deep web discussion of organization, phishing, domain and
1
Network Security Threats and Control Measures for Open University Malaysia_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Cyber Attacks by Foreign Governments
|5
|1649
|17

Network Security Analysis: Cyber Security
|10
|1925
|30

Importance of Cyber Security in Protecting Against Cyber Attacks
|26
|8270
|85

Sample Assignment on Cybercrime PDF
|6
|1332
|63

Cybersecurity: Protecting Home and Office from Cyberattacks
|12
|2626
|224