Cybersecurity: Automating Network Defence and Attack Resistance Tools

Verified

Added on  2023/04/26

|4
|655
|77
Essay
AI Summary
This essay explores the various tools and strategies employed in cybersecurity for automating the defense of networks against cyber attacks. It highlights the importance of firewalls in monitoring network traffic, antivirus software in detecting and eradicating malware, and SSL/TLS with PKI for encrypting server communications. The essay also emphasizes the shift towards managed detection services for rapid response to security issues, the role of penetration testing in identifying vulnerabilities, and the significance of staff training in promoting cybersecurity awareness. It concludes that investing in these tools and services is crucial for businesses to protect themselves from increasingly sophisticated cyber threats, ensuring long-term security and protection.
Document Page
Running head: CYBERSECURITY
Cybersecurity
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBERSECURITY
Differences in the tools in using the automating defense of networks and attacks
of cyber-security attacks for forming strategic defensive parameters resisting the
threats of networks:
The cyber-security indicates various techniques that are used for protecting the integrity of
networks, data from attack, programs, unauthorized access and damages. The following study
demonstrates the differences in the tools utilized for automating defence of systems and attacks of
cybersecurity. This is from various strategic defense parameters resisting the threats of networks.
First of all, the firewall monitors the network traffic and the attempts of connection. They
have been deciding to choose whether they must be able to access easily into the system. Though
being useful, they have their limitations. Moreover, the antivirus software alerts the malware
infections and virus and delivers extra services like scanning emails. This is to assure that they are
free from different malicious attachments of any web links. The current programs of antivirus
perform the necessary security measures like quarantining of active threats and eradicate them.
Besides, many relate to TLS or SSL with PKI, the technology encrypting server
communication has been liable for HTTPS and then padlock or fetch that under the bars of browser
address. At one hand, SSL is highly needed for public security sites and also for internal networks.
Moreover, PKI can also resolve various cybersecurity pain points and deserves the place in the
security suite (Weinstein, 2016).
Regarding managed detection services, cybersecurity has witnessed a shift from investment
in innovations attempting to secure the probability of the attack in advancing towards various
services reacting to and finding issues of potential security. This also involves responding as fast as
Document Page
2CYBERSECURITY
possible. This is less damaging in detecting and eradicating the attacks prior it spreads instead of
trying to handle the attack that is in strong foothold over the IT network.
Apart from this, the penetration testing is also vital to test the security systems of the
business. As any penetration test occurs, the professionals of cybersecurity have been using the
similar measures used by criminal hackers. This is to check the useful vulnerabilities and sectors of
various weaknesses (Dorsey et al. 2017). This pen test is helpful to simulate the attacks faced by the
business from various criminal hackers that includes password cracking and injection code to
phishing.
Then, there is staff training, where having the knowledge of employees understanding the
role in the field of cybersecurity is an active form of defence against the attacks. Furthermore, there
are various types of training tools one can invest in educating the staffs regarding practices of
cybersecurity.
Thus it can be said as the cyber-criminals continue to extend the method and sophistication
levels, it is vital for the business in investing the services and tools. Failing to do that one can leave a
position where the companies can be targeted easily for various hackers. Moreover, the cost of
expense can put the cybersecurity professional’s off. However, it can be reminded that this outlay
can reward the business having protection and security in long -terms.
Document Page
3CYBERSECURITY
References:
Dorsey, D. W., Martin, J., Howard, D. J., & Coovert, M. D. (2017). Cybersecurity issues in
selection. In Handbook of employee selection (pp. 913-930). Routledge.
Weinstein, R. (2016). Cybersecurity: Getting beyond Technical Compliance Gaps. NYUJ Legis. &
Pub. Pol'y, 19, 913.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]