Security is impacted by many factors including what type of network or system is being used, what systems will be connected
All posts must be (2) substantive responses with a minimum of 150 words each for Responses 1 and 2. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that's discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
Security is impacted by many factors including what type of network or system is being used, what systems will be connected to it or in communication with it and how available it should be to users amongst others. For all types of networks, it is vital to use the principle of defense in depth to secure it on all levels of the TCP/IP structure, and also, using legal regulations to apply policies that meet the criteria that is expected in general and for the specific industry you work in. Defense in depth is meant as not a strict use of certain security features but rather a term used to describe multiple layers of security for differing aspects of a system. These controls all work together to provide added layers of security so if a threat bypasses one security control, hopefully another one will catch it. Some of the mainstay controls that can be used are POLP or principle of least privilege, firewalls, port filtering, Intrusion prevention system, anti-virus/anti-malware, physical precautions, training for staff and auditing. These are all various ways to implement security but by far a comprehensive list. Even within this listing, there are a great number of details and security options that can be implemented. Having a policy and framework that specifies the controls that are to be used, lays out the network schematic and has a detailed Disaster Recovery Plan included is essential as well. These documents will help to know how to handle any situation, however they must be revisited and updated frequently. Audits and risk assessments will help these to remain up to date if they are revisited and updated with those occur.
-AMANDA
Plus, P. C. (2009, September 12). How to secure your TCP/IP Ports. TechRadar. Retrieved January 3, 2022, from https://www.techradar.com/news/networking/how-to-secure-your-tcp-ip-ports-633089/2
Winterfeld, Steve, and Jason Andress. The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice, Elsevier Science & Technology Books, 2012. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/apus/detail.action?docID=1073026.
RESPONSE 2:
Security architecture consists of tools, techniques, and technologies that detect and prevent network penetration additionally, practicing cybersecurity countermeasures ensures the network will be hardened. It is good to have a digital footprint of the organization to gather information about the different devices within the organization before performing a penetration (pen) test (Levy, 2021). It would be a good idea to start with what security tools are in place such as firewalls, intrusion detection systems (IDS) and other devices are operating. A network map can be created that can identify things like networks, remote sites, routers, servers, and other important devices (Helpsystems, 2017).
Some countermeasures to preventing attacks are to check for things like thing Open-Source intelligence (OSINT) this could be from the corporate website, online forums, social media, and other online outlets. If these sites are releasing too much general information about the organization it could lead to a social engineering attack (Bisson, 2021). Another countermeasure that not all organizations think to do is securing their trash. This is important because if sensitive data or important data and documents are found in the trash a hacker can use that information or exploit it.
Another countermeasure is securing the network because a hacker could be wardriving around to look for unsecured networks to penetrate (Panda, 2020). With technology on the rise now drones are being sent to look for weak networks so implementing security cameras that can identify drones is a good idea. Physical barriers should be in place as well such as locked doors that require a badge. Another option is having a security guard who requires everyone who walks through the door to present their photo badge. These things can help secure and prevent cybersecurity breaches.
-ROBERTO
Bisson, D. (2021, September 14). 10 open-source intelligence tools (that actually work with your existing security software). Retrieved January 04, 2022, from https://securityintelligence.com/articles/10-open-source-intelligence-tools-existing-security-software/
Helpsystems. (2017, February 22). Network Mapping Best Practices: Four Steps for Success. Retrieved January 04, 2022, from https://www.helpsystems.com/resources/articles/network-mapping-best-practices-four-steps-success
Levy, E. (2021, June 02). What is a digital footprint? Retrieved January 04, 2022, from https://www.netsafe.org.nz/digital-footprint/
Panda. (2020, December 17). Wardriving: What is it + how can you detect it? Retrieved January 04, 2022, from https://www.pandasecurity.com/en/mediacenter/security/wardriving/
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.