University Network Security Events Report - KIT711
VerifiedAdded on 2022/08/23
|5
|1077
|20
Report
AI Summary
This report analyzes network security events, highlighting the growing concern of VPN exploitation. It discusses the vulnerabilities of remote access VPN vendors and the increasing threat of web-based application attacks and ransomware. The report emphasizes the importance of proactive security measures, including the implementation of new SaaS-based remote access solutions and the maintenance of up-to-date security software. It underscores the need for enterprises to consider web server functionality and prevent security gaps to mitigate data loss and business interruptions. The report references various sources to support its analysis, emphasizing the critical role of network security in protecting data, boosting client confidence, and preventing legal and reputational damage. The author emphasizes the importance of adapting to new web-based applications and addressing vulnerabilities to ensure robust network security.

Running head: NETWORK SECURITY EVENTS
NETWORK SECURITY EVENTS- Growing VPN exploitation is
cause for concern
Name of the student
Name of the University
Author Note
NETWORK SECURITY EVENTS- Growing VPN exploitation is
cause for concern
Name of the student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
NETWORK SECURITY EVENTS
Network security is considered as the most important factor as this helps in preventing
the system from getting infected. Network security is basically referred to the protection that is
offered towards the file access and directories so that it becomes easy to prevent unauthorized
access and changes within the system (Rathore et al. 2017). The news stated that remote access
VPN vendors with consistent use of web are more vulnerable to attacks. It has been analyzed that
security vendors are also vulnerable to attacks. There is a need to manage the high severity so
that it does not hamper the overall data security (Raw, Kumar and Singh 2013). According to the
Black Hat presentation attacks that hampered the overall performance are often web based
application attacks. Information security needs to be maintained properly so that it becomes easy
to manage the overall performance. One of the most important issues that have been predicted is
ransomware attack (Sullivan, 2020). Ransomware attacks are very effective and there is a need to
integrate proper protection so that the chances of impacts can be reduced. The article states that
there is a need for enterprise to consider the web server functionality. With proper application
development it will become east to defend the system from possible attacks and hackers.
After analyzing the article it can be stated that there is a need to prevent the security
threats. With the use of proper prevention it becomes easy to manage data loss and interruption
within business can be reduced (Satria et al. 2018). The main reason to implement proper
network security prevention is to reduce the overall business loss.
In order to prevent the chances of threats it has been observed that new SaaS- based
remote access solutions. The emerging solution has the ability to prevent the system from
possible threats. Thus there is a need to protect the system from possible events that are taking
place within the system. With proper adoption of trends and better analysis it will become easy
to prevent the attacks (Modi et al. 2013). Network security helps providing proper support
NETWORK SECURITY EVENTS
Network security is considered as the most important factor as this helps in preventing
the system from getting infected. Network security is basically referred to the protection that is
offered towards the file access and directories so that it becomes easy to prevent unauthorized
access and changes within the system (Rathore et al. 2017). The news stated that remote access
VPN vendors with consistent use of web are more vulnerable to attacks. It has been analyzed that
security vendors are also vulnerable to attacks. There is a need to manage the high severity so
that it does not hamper the overall data security (Raw, Kumar and Singh 2013). According to the
Black Hat presentation attacks that hampered the overall performance are often web based
application attacks. Information security needs to be maintained properly so that it becomes easy
to manage the overall performance. One of the most important issues that have been predicted is
ransomware attack (Sullivan, 2020). Ransomware attacks are very effective and there is a need to
integrate proper protection so that the chances of impacts can be reduced. The article states that
there is a need for enterprise to consider the web server functionality. With proper application
development it will become east to defend the system from possible attacks and hackers.
After analyzing the article it can be stated that there is a need to prevent the security
threats. With the use of proper prevention it becomes easy to manage data loss and interruption
within business can be reduced (Satria et al. 2018). The main reason to implement proper
network security prevention is to reduce the overall business loss.
In order to prevent the chances of threats it has been observed that new SaaS- based
remote access solutions. The emerging solution has the ability to prevent the system from
possible threats. Thus there is a need to protect the system from possible events that are taking
place within the system. With proper adoption of trends and better analysis it will become easy
to prevent the attacks (Modi et al. 2013). Network security helps providing proper support

2
NETWORK SECURITY EVENTS
towards the workstations from harmful spyware. This also ensures that shared data is
kept securely within the system from possible threats. Huge traffic can cause stability problems
and may lead to vulnerabilities in the system.
However after evaluating the factors that are associated with ransomware it becomes
essential to prevent the personal data from possible cyber-attacks. Security software needs to be
implemented within the system so that they can prevent from antivirus. Every fact needs to be
detected properly so that the threats within the device can be reduced efficiently. the software
and devices that are used within the system needs to be maintained and updated properly so that
it does not hamper the data stored within the system (Stallings 2019). With the implementation
of proper software and security system it becomes easy to prevent the system from possible
threats. It has been observed in the news that VPN was asked to adapt to new applications that
are mainly web based and presented within the browser (Sullivan, 2020). VPNs have designed
several dominant usage patterns for managing the web functionality and also ensure that
attackers are capable of protecting the system. In order to resolve the solution it becomes
essential to prevent the gaps that are present within the security application. With proper
adoption and security solution it will become easy to prevent the data from breaching and
hacking. The vulnerabilities that exist in several SSL VPN products allow the attacker to retrieve
data from arbitrary files. It is important to implement proper solution that will be capable of
protecting the data from unwanted threats and unwanted attackers.
Network security is concerned to be important as this helps in mitigating the risks and
will ensure that the data are protected. Network security helps in boosting the client and
consumer confidence, and ensures that proper protection is provided towards the business from
the reputational and legal fallout of a security breach (Yang et al. 2017). Network security helps
NETWORK SECURITY EVENTS
towards the workstations from harmful spyware. This also ensures that shared data is
kept securely within the system from possible threats. Huge traffic can cause stability problems
and may lead to vulnerabilities in the system.
However after evaluating the factors that are associated with ransomware it becomes
essential to prevent the personal data from possible cyber-attacks. Security software needs to be
implemented within the system so that they can prevent from antivirus. Every fact needs to be
detected properly so that the threats within the device can be reduced efficiently. the software
and devices that are used within the system needs to be maintained and updated properly so that
it does not hamper the data stored within the system (Stallings 2019). With the implementation
of proper software and security system it becomes easy to prevent the system from possible
threats. It has been observed in the news that VPN was asked to adapt to new applications that
are mainly web based and presented within the browser (Sullivan, 2020). VPNs have designed
several dominant usage patterns for managing the web functionality and also ensure that
attackers are capable of protecting the system. In order to resolve the solution it becomes
essential to prevent the gaps that are present within the security application. With proper
adoption and security solution it will become easy to prevent the data from breaching and
hacking. The vulnerabilities that exist in several SSL VPN products allow the attacker to retrieve
data from arbitrary files. It is important to implement proper solution that will be capable of
protecting the data from unwanted threats and unwanted attackers.
Network security is concerned to be important as this helps in mitigating the risks and
will ensure that the data are protected. Network security helps in boosting the client and
consumer confidence, and ensures that proper protection is provided towards the business from
the reputational and legal fallout of a security breach (Yang et al. 2017). Network security helps
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
NETWORK SECURITY EVENTS
in ensuring that proper protection towards information and data shared across the
network. Proper network security will provide better facility and support towards the
performance of the system. This will prevent the system from possible threats and issues.
NETWORK SECURITY EVENTS
in ensuring that proper protection towards information and data shared across the
network. Proper network security will provide better facility and support towards the
performance of the system. This will prevent the system from possible threats and issues.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
NETWORK SECURITY EVENTS
References
Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security
issues and solutions at different layers of Cloud computing. The journal of
supercomputing, 63(2), pp.561-592.
Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S. and Park, J.H., 2017. Social network security:
Issues, challenges, threats, and solutions. Information sciences, 421, pp.43-69.
Raw, R.S., Kumar, M. and Singh, N., 2013. Security challenges, issues and their solutions for
VANET. International journal of network security & its applications, 5(5), p.95.
Satria, D., Alanda, A., Erianda, A. and Prayama, D., 2018. Network Security Assessment Using
Internal Network Penetration Testing Methodology. JOIV: International Journal on Informatics
Visualization, 2(4-2), pp.360-365.
Stallings, W., 2016. Network security essentials: applications and standards. Pearson.
Sullivan, P., 2020. Growing VPN Exploitation Is Cause For Concern. [online] Infosecurity
Magazine. Available at: <https://www.infosecurity-magazine.com/blogs/vpn-exploitation-
concern/> [Accessed 18 March 2020].
Yang, K.P., Dejean, R., Clapp, C., Banks, R., Raygadas, D. and Bendanas, I., 2017. Network
Security Practical Concepts, Importance, and Potential Implications. Network Security, 4(10).
NETWORK SECURITY EVENTS
References
Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security
issues and solutions at different layers of Cloud computing. The journal of
supercomputing, 63(2), pp.561-592.
Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S. and Park, J.H., 2017. Social network security:
Issues, challenges, threats, and solutions. Information sciences, 421, pp.43-69.
Raw, R.S., Kumar, M. and Singh, N., 2013. Security challenges, issues and their solutions for
VANET. International journal of network security & its applications, 5(5), p.95.
Satria, D., Alanda, A., Erianda, A. and Prayama, D., 2018. Network Security Assessment Using
Internal Network Penetration Testing Methodology. JOIV: International Journal on Informatics
Visualization, 2(4-2), pp.360-365.
Stallings, W., 2016. Network security essentials: applications and standards. Pearson.
Sullivan, P., 2020. Growing VPN Exploitation Is Cause For Concern. [online] Infosecurity
Magazine. Available at: <https://www.infosecurity-magazine.com/blogs/vpn-exploitation-
concern/> [Accessed 18 March 2020].
Yang, K.P., Dejean, R., Clapp, C., Banks, R., Raygadas, D. and Bendanas, I., 2017. Network
Security Practical Concepts, Importance, and Potential Implications. Network Security, 4(10).
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.