Network Security Analysis and Recommendations for OUM, Malaysia

Verified

Added on  2023/01/19

|25
|1420
|50
Report
AI Summary
This report, prepared for Open University Malaysia (OUM), addresses the critical issue of network security in the face of increasing cyber attacks. It begins with an overview of the security needs of OUM, highlighting the vulnerabilities arising from data breaches and malicious threats. The report then delves into the specifics of external attacks, detailing various techniques such as malware, phishing, and cross-site scripting, as well as internal attacks, focusing on malicious cyber attacks, misuse of gadgets, and weak passwords. A significant portion of the report is dedicated to control measures, including preventive, detective, and corrective controls, to mitigate the risks. Key approaches to cybersecurity, such as biometric security, are also discussed. The report emphasizes the rising cost of breaches, the sophistication of modern hackers, and the importance of data security. The conclusion stresses the need for OUM to identify and implement appropriate cyber security measures to protect its data and maintain operational integrity. The report is supported by a comprehensive list of references.
Document Page
NETWORK SECURITY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Content
INTRODUCTION
Overview of security needs of OUM
External network attacks
Types of External Attacks
Internal Attacks
Types of Internal Attack
Control Against Network
Preventive method for Cyber Attack
Detective Control
Corrective Control
Key Approaches for Cyber Security
CONCLUSION
REFERENCES
Document Page
INTRODUCTION
Network security is defined as the approach used to protect the integrity and
usability of the networking services and data. Cyber attack is one of the most
alarming threat to the network security and thus it is very essential to adopt
suitable measures for providing network security.
Document Page
Overview of security needs of OUM
The biggest networking threat for the OUM is data breach and
malicious threats. The existing threats make the network system of university
highly vulnerable for the unauthorised access and data breach.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
External network attacks
The malicious campaign and threat actions that are conducted form
the outside of the organization and attack the surface that exist outside the
firewall.
Document Page
Types of External Attacks
There are different type of techniques are used by Attack
hackers and external people from the organization to cause damage
to the data and information (Franck, 2016). That possess by the
organization. Mainly these techniques are- Malware, Phishing and
cross site scripting.
Malware
Phishing Attack
Cross site scripting
Document Page
Malware
Malware and malicious software are known as programs and files that
are dangerous to computer. Computer viruses, worms, trojan horses and
spyware are considered as malware.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Phishing Attack
This type of cyber attack are common these days. Phishing is a process
that is used by hackers to infect computer system of user
.
Document Page
Cross site scripting
Cross site scripting is a application layer web attack. It is a XSS
vulnerabilities target script that id embedded in the page which is executed on the
consumer end not on server side.
Document Page
Internal Attacks
Internal attacks can be considered as the attacks which occurred when
individual groups in organization tries to disrupt operations of organization
and harm organizational assets.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Types of Internal Attack
Internal attack consists of different kind of actions that are
performed by people who are present inside the organization.
Through different ways insiders can infect or manipulate the
network of OUM which are- Malicious Cyber Attack, misuse of
gadget, fraud and weak pass word. These are the most common
type of internal attacks.
Malicious Cyber Attacks
Misuse of Gadgets
Weak Passwords
Document Page
Malicious Cyber Attacks
Employees and members of organization have access to the network
and data. They have higher chances to modify and steal the confidential data
of OUM. Employees can miss use their authority and capacity to open back
door for hackers and unauthorised people to access, use and manipulate
network of university for their personal benefits.
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]