Cybersecurity: Exploring Access Control, Logging, and Firewalls

Verified

Added on  2019/09/22

|4
|350
|196
Homework Assignment
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
FUTURE EXPLORATION
Student
27 October 2016
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
THREE KEY AREAS FOR FUTURE EXPLORATION.............................................................................2
REFERENCES...............................................................................................................................................3
1 | P a g e
Document Page
THREE KEY AREAS FOR FUTURE EXPLORATION
1. Use of Access Controls
Implementation of access control on my device can be another security area. For example securing
the personal data like social media passwords, account information, sensitive bank information
stored in the device, other information like images, chats etc. This can be done when try to
implement access control on individual applications via application locking tools or procedures.
These ensure that the application and the data within them is secure and not misused intentionally
or unintentionally.
2. Detailed Log creation
Logging can be another area for exploration which can help in guarding against the cyber threats. We
can maintain the cyber security if we implement logs and record the internet activity. This can be
done by adding tools to the device which maintains the logs. So now wherever an attack takes
places or any intrusion, such addresses can be traced and blocked. Thus we will be able to track
any security holes in application and hence can be secured against any such internet threats. Also
we cab patch up such holes and maintain a security protocol.
3. Use of firewalls
We can use firewalls to guard our private network against malicious users. The malicious IP address
we find via logging can be blocked in future via firewalls. Or we can even block other website
URLs, pop ups, ads etc. which can be used for social engineering or phishing. Firewalls
implementation cab be done by installing anti-virus software or other specialized firewall tools. Also
they can filter every message packet, hence making it sure that only secure and safe messages
reach the message.
2 | P a g e
Document Page
REFERENCES
References
Zanderigo, M., 2016. 10 Best Practices for Cyber Security in 2016. [Online]
Available at: http://www.observeit.com/blog/10-best-practices-cyber-security-2016
[Accessed 26 October 2016].
3 | P a g e
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]