logo

Network Requirements and Mitigation

5 Pages854 Words95 Views
   

Added on  2023-01-12

About This Document

This document discusses the network requirements and mitigation strategies to prevent cyber-attacks and secure resources. It covers the threats faced by networks and the recommended mitigation strategies. It also explores the three pillars of cyber security - people, process, and technology.

Network Requirements and Mitigation

   Added on 2023-01-12

ShareRelated Documents
Running Head: Networking 0
Networki
ng
Individual task
Student name
Network Requirements and Mitigation_1
Networking 1
Network requirements and mitigation
The Australian Cyber Security Centre (ACSC) has provided different threats for network
and it is a serious consent about the cyber security. It is necessary to everyone to aware about
these threats and used proper controls to mitigate them (ACSC, Strategies to Mitigate Cyber
Security Incidents, 2019). Threats, which can make harm these cyber to data of organization:
1. Targeting cyber intrusions
2. External adversaries and ransomware who stop access of network or computer system
from malfunctions
3. Malicious insiders who steal data or destroy data using different functioning
There are different mitigation strategies to prevent the network from cyber-attacks of an
organisation. ACSC has recommended eight essential mitigation strategies to prevent the
organization from cyber-attacks as a baseline. However, implementation of those strategies van
is more cost-effective in terms of effort, money, and time (Von Solms & Van Niekerk, 2013).
These are the essential eight mitigation strategies:
Application whitelisting: it is used to control the execution of unauthorized processes
and software
Daily backups – to maintain the availability of critical data
Patching applications: it is used to remediate known security vulnerabilities, such as
open ports, old operating systems, and many others.
Multi-factor authentication: it is used to protect against risky activities, such
unauthorized access, and illegal way to access the system.
Configuring Microsoft Office macro settings: it is used to block untrusted macros,
which can create many issues to security of system.
patching operating systems – to remediate known security vulnerabilities
Application hardening: it is used to protect against vulnerable functionality of the
operating system and application software.
Network Requirements and Mitigation_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1749
|483

Network Security & Its Vulnerabilities | Document
|9
|1749
|130

Information Assets
|20
|3704
|91

Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301

Information Security - Gordon Mediation LTD | Assignment
|13
|2950
|11