Enterprise Digital Security: Cyber Attacks and Network Security Report

Verified

Added on  2022/11/15

|5
|561
|415
Report
AI Summary
This report delves into the critical realm of enterprise digital security, meticulously analyzing the various types of cyberattacks that threaten organizational networks, such as Denial of Service, Man-in-the-Middle, phishing, cross-site scripting, and ransomware attacks. It then evaluates the effectiveness of different network security mechanisms, including firewalls, Security Information and Event Management systems (SIEM), intrusion prevention/detection systems (IPS/IDS), and VPN security systems. Furthermore, the report examines the significance of security mechanisms like SAML, SSL, and the importance of management and operational controls in maintaining a robust security posture. It concludes by emphasizing the legal, social, and ethical implications of security designs and their impact on network security, highlighting the importance of employee adherence to moral principles and professional standards in safeguarding an enterprise's digital assets.
Document Page
Running head: ENTERPRISE DIGITAL SECURITY
ENTERPRISE DIGITAL SECURITY
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ENTERPRISE DIGITAL SECURITY
Table of Contents
Introduction: 2
Discussion: 2
Conclusion: 3
References: 4
Document Page
2ENTERPRISE DIGITAL SECURITY
Introduction:
The aim of the report is to evaluate on the matter of cyber attacks on the enterprises
and evaluating the network securities that are available for protection of the enterprise
network.
Discussion:
An attack that has happened on the network of an enterprise is an information based
security threat that has the intention of the attacker to gain access into the network for
committing fraudulent activities that includes destroying, removing and revealing private
information without the authorized consent of the organization.
The enterprise might be attacked in various attacking ways that includes, Denial of
Service attacks, Man in the Middle type of the attacks, Phishing, attacks that are driven by in
nature, Cross site scripting and Ransomware attacks (Savaglia & Wang, 2017). There are
many types of the network security like the Firewalls, email gateways, Security information
and event management system (SIEM), intrusion prevention/detection system (IPS/IDS),
Network Access Control (NAC), VPN security system. The security mechanisms also
includes the processes of the SAML Holder of Key, Mutual Certificates Theory, Endorsing
Certificate, Message Authentication over SSL, Transport Security layer (SSL), SAML Sender
Vouches with Certificates, SAML Authorization over SSL, STS Issued Token (Turner,
2014). These are the security mechanisms or the security devices under technical control that
will help to combat the attacks on the networks of the organization. However, the controls
over the security that aims in focusing the management that is on risk and also the
management that is based on the system of the security come under the management controls.
The operational controls for the security controls state that the security controls which are the
basically implied and are executed by the peoples to receive the ultimate result.
Document Page
3ENTERPRISE DIGITAL SECURITY
It can be evaluated that the base for all of the secured systems are the devotion of the
employees on the field of the moral principles and the maintenance of the professional
standards of all employees in an enterprise. It can be stated that people being the part of the
solution are also proved as most of the problem. Thus it can be envisioned that the use of the
security designs are legally, socially and ethically impactful on the network security for the
organization.
Conclusion:
The report concludes that the varieties of the security mechanisms that are available to
protect the enterprise network are very impactful in restricting the fraudulent activities that
causes the demotion of en enterprise. The types of the security device mechanisms have been
discussed and the legal and sociological implications of the security devices have been
evaluated.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4ENTERPRISE DIGITAL SECURITY
References:
Savaglia, J., & Wang, P. (2017). CYBERSECURITY VULNERABILITY ANALYSIS VIA
VIRTUALIZATION. Issues in Information Systems, 18(4)
Turner, S. (2014). Transport layer security. IEEE Internet Computing, 18(6), 60-63.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]