Fill This Form To Receive Instant Help
Homework answers / question archive / Bellevue UniversityCIS 406 Find an article that deal with security issues related to system design or architecture
Find an article that deal with security issues related to system design or architecture. Explain how the article related and means for network security in the future.
Answer:
Introduction
The network structures of most organizations are vulnerable to hacker attacks. This is a threat to the critical information of organizations, as this information can be used for malicious purposes. This report provides an in-depth analysis of the security threats that can be brought into the network and provides appropriate security solutions. The purpose of the analysis is to identify which ones need to be safer and to identify the best ways to keep them safe.
1. Potential malicious attacks and / or threats that could be carried out against the network and organization
The potential attacks and threats that the network may receive illegally through the theft of Suffer operator accounts and rights, hardware and software software, attackers using codes and commands to damage systems, data alteration and data theft are illegal. And finally the use of the most important data for economic gain. These acts are carried out by a highly experienced person or group for individual or industrial industrial espionage. These attacks can come from within the organization or from outside the organization. Internal attacks are called internal attacks, while external attacks of the organization are called external attacks (Somsundaram, Srivastava and EMC Education Services, 2012).
2. Potential impact of the malicious attacks
Any threat or attack to an organization's network structure can greatly affect its functions, computer performance, and overall network use. This is because providers, consumers and all network users will be affected. The malicious attacks identified can have many effects on the organization. The potential effects include the loss of productivity of organizations. This has a very serious impact because it has a direct economic impact on the organization. Most organizations are generally vague about the methods for measuring productivity decline. The economic impact includes losses that require human intervention, interruptions in business operations, delays in transactions. The organization may experience a financial impact. These costs can occur when attempting to repair a system and when there is a loss of revenue due to reduced productivity. Time lost due to the operating recession also has a financial impact. Administrative workers can also experience excessive burdens when answering user questions.
3. Security controls to protect against the malicious attacks.
The company needs to invest in the latest security measures to ensure that networks are highly protected from malicious attacks. For this, the organization has to decide how much it is willing to invest in the protection of important data and assets. To find the right balance between the two, one must weigh the cost of security protection against the cost of loss. Possible steps include the use of general service banners that do not share configuration information such as software names and versions. The firm wants to hire experts for sniffing. Sniffing is known as the process of monitoring network data traffic. Sniffing with the help of monitoring activities on the network. Firms need to invest in strong physical protections that prevent bullying devices from accessing the network (Startard, & Pinto, 2011). These include encrypted credentials and requests to access the network.
4. Analysis of the potential concerns for data loss and data theft that may exist in the network
Violation of customer's personal information, such as credit card information. Many clients have reported data breach cases that occur during normal processing and data collection. There are indications of attacks by computer networks storing their information in the cloud, which can lead to data theft. Data Breach is a concern for all CEOs because it is a nightmare to have another person access your personal information. The other concern is data loss. Data loss is most often caused by a system failure that does not back up the data. Disk drives can stop working and die when the system user or owner does not back up. Data loss can also occur when an owner loses a key or password for specific data. Data loss can cause intruders to use information for malicious purposes by breaking accounts. For consumers and businesses, losing personal data forever is terrifying (Stutthard, & Pinto, 2011). Another concern is the hijacking of account and service traffic. This is a concern in the cloud, but it is a very big concern. Loss of password and credentials can lead to this and loss of control of accounts. The intruder can ruin the transaction, change the data, give customers false information and feedback, or redirect customers to competitors or other inappropriate sites (Peltzerker, 2011).
5. Analysis of the potential impact of the selected concerns for data loss and data theft
Data loss and theft can have dangerous consequences. We live in an information age today when any loss or theft of data can have serious consequences. It is very difficult to change the organization's network information. If the aforementioned problems occur to an organization, it can result in various damages, for example, cybercriminals may have the opportunity to steal digital IDs or steal money from customers and companies. In the event of data loss, the malware will delete the data in the network, and the effects will depend on how important the information is (Obaidat, 2011). Firms have some important information that can lead to large losses, such as financial transaction records and investments. An organization may also miss a project or project progress, which is a major obstacle to achieving their goals.
6. Security controls that you would consider implementing to protect against the selected concerns for data loss and data theft
To meet the challenges mentioned above, an organization needs to move beyond information technology when analyzing data-related risks. Data security should go beyond the IT department. An organization needs to evaluate remote project protocols and analyze data storage practices to help formulate policies and procedures that can help secure the network (Obaidet, 2011). The organization also needs to create a comprehensive data loss protection plan that will help it take decisive action. The scheme will also help prevent operational paralysis, and these efforts will be recognized by customers who see an organization taking proactive measures to address security risks. The organization also needs to train employees in managing sensitive data properly. This will help employees understand that the security strategy will only work if they follow the instruction.
References