logo

Network Security Management

12 Pages3039 Words83 Views
   

Added on  2022-12-26

About This Document

This document provides an overview of network security management, including cyber security threats, countermeasures, and incident response. It discusses the importance of education and awareness, regular system updates, two-factor authentication, and security log inspection. The document also covers the steps involved in cyber incident response. Study material and assignments on network security management are available at Desklib.

Network Security Management

   Added on 2022-12-26

ShareRelated Documents
Running head: NETWORK SECURITY MANAGEMENT 1
Network Security Management
Student's Name
Institutional Affiliation
Network Security Management_1
NETWORK SECURITY MANAGEMENT 2
Table of Contents
1.0 Introduction................................................................................................................................2
2.0 Cyber security landscape/ threats..............................................................................................3
2.1 Internet of Things (IoT) device threats..................................................................................3
2.2 Crypto-jacking and Mobile Malware.....................................................................................3
2.3 Cross-site Scripting threat......................................................................................................4
2.4 Connected cars and Semi-autonomous vehicles....................................................................4
2.5. Shortage of Cybersecurity professionals and cyber-physical attack.....................................4
2.6 Attacks Sponsored by the State..............................................................................................5
2.7 Phishing threat........................................................................................................................5
3.0 Counter measures for Cybercrimes...........................................................................................6
3.1 Cybersecurity Education and Awareness...............................................................................6
3.2 Regular update and patching of network systems..................................................................7
3.3 Two- factor authentication for maximum security................................................................7
3.4 Regular collection of Security logs for inspection.................................................................8
4.0 Cyber Incident Response...........................................................................................................8
4.1 Assemble the Security team...................................................................................................8
4.2 Ascertain the source of the cyber incident.............................................................................9
4.3 Contain the damage and perform a recovery action..............................................................9
4.4 Assessment of the damage and strategies to prevent incidents..............................................9
5.0 Conclusion.................................................................................................................................9
References......................................................................................................................................11
Network Security Management_2
NETWORK SECURITY MANAGEMENT 3
1.0 Introduction
Network security involves both the software and the hardware technologies whereby it is
any activity that has been designed for the protection of the integrity and the usability of one's
data and network. It is the security that is provided to any given network from access that is
unauthorized. Many companies systems that are involved in communications and transactions
that are regular in nature across the globe are vulnerable to cyber-attacks encouraging cyber-
attacker to access data, programs and even systems in an authorized manner. The complexity of
network architecture is seriously being faced by cyber-attackers who are always out to exploit
any available vulnerability (Abomhara, 2015). This has risen an alarm to many government
organizations, businesses and even individual to improve their security so as to protect their
systems from cybercrime or network insecurity. There are many management programs with
policies and its procedures that are put in place to help mitigate network insecurity from thriving
further and spreading in networks. These measures need to be put in place and action to avoid
any form of downtime that can cause a lot of damage and disruption and tarnish the
organization’s reputation.
2.0 Cyber security landscape/ threats
2.1 Internet of Things (IoT) device threats
The cyber security landscape is very dynamic and hackers are constantly looking for
vulnerabilities to exploit in networks that are corporate; meaning that the days of just building a
wall that is defensive to surround a corporate are long gone and something more advanced and
trending is needed for network defense. There are so many Cyber security threats that need
immediate actions of mitigation. For example, the IoT devices threats, whereby many company
networks are adding several solutions like, cameras to monitor security and make maintenance
Network Security Management_3
NETWORK SECURITY MANAGEMENT 4
the last consideration. Without managing, implementing and updating process of the network,
the IoT device will be vulnerable to cyber-attacks.
2.2 Crypto-jacking and Mobile Malware
Crypto-jacking is another threat to network security. This has been accelerated by the
absence of network segmentation and even backups. One of the biggest threats is the ransom
ware that badly affects the businesses network. It is believed beyond a reasonable doubt that
actors of the threat are employing the previously used ransom ware for data encryption to ransom
resources on the network or even to mine crypto currency. Form the standpoint we can visualize
a great threat that is encouraged by the appliances systems and other resources that can easily be
used to mine crypto currency (Caldwell, 2018). Another cyber security threat is mobile malware.
This is mainly because devices that are associated with mobility are an attack target. Many
organizations that adopt and use the mobile device management have discovered that the
concerns about privacy have limited adoption of their devices hence they end up ignoring this
privacy aspect making any of these devices in the network vulnerable to attacks from
cybercriminals. The old version of some of the mobile devices such as the Android devices
which is quite challenging to get them to control and support those devices since it is still
pointing back to issues of mobiles. This is a threat to an individual and even an organization
network.
2.3 Cross-site Scripting threat
Cross-site scripting is another thing that threatens the security of our networks. This is the
leading type of vulnerability that permit adversaries to make use of an organization or business
website for the execution of codes which are untrusted in the browser of the targeted victim
(Fang et al., 2018). This makes it even easier for the cyber-attackers to make an interaction with
Network Security Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Network and Security - Assignment
|8
|1292
|197

Crypto Currency and Cyber-Crime: Types of Malware, Mitigation Tools and Processes
|14
|919
|105

Cyber Security Attacks and Techniques
|14
|1105
|277

Crypto-currencies and Cybercrime
|11
|3351
|115

Security threats Assignment PDF
|17
|5254
|133

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227