Top common network security threats explained
IT2250
Jennifer Hanson
policies and account access requests. And technical policies are for the technicians that will carry out the security responsibilities of the system. These policies will include all of the end-user policies and then the application policies (database credentials coding policy, source code protection policy, acceptable encryption policy), network policies (extranet policy, network access standards, router and switch security policy, server security policy and network access policy) and wireless communication policy.
Because in all networks there is a human element, we will provide additional training to ensure that all users on the network will be educated. A lack of education about security practices can place a network in a vulnerable position. We will train all employees to understand secure file sharing, USB thumb drives, mobile device use and explaining the importance of emails with attachments. We also will protect against physical security threats such as unauthorized access into areas and theft of mobile devise. Attackers can enter secured areas through tailgating, hacking into access control smart cards or breaking in through doors. Defenses for theses will include physical intrusion detection systems and alarm systems. Regarding mobile devices such as laptops and tablets will be protected by RFID systems and cable locks. We will also monitor access to the server room, cable and workstations.
will go to Setting >Network & Internet >VPN. Click on VPN name, select Connect and enter the password.
For our network we will be implementing different types of network security hardware such as routers, firewalls and encryption software. The firewall will have a list of web addresses that are not accessible and monitor traffic from the Internet. This will protect us against outside threats from logging in to our network. The firewall will be able to provide summaries to the administrator about what kinds and amounts of traffic passed through it, how many attempts there were to break into it, etc. The routers will restrict authorized access to the network via registered MAC addresses. Network traffic-based IDS capture network traffic to detect intruders. These systems work as packet sniffers that read through incoming traffic and use specific metrics to assess is a threat is imminent. We will also implement a proxy server and web filter. The proxy server will act as “negotiators” for request from client software seeking resources from other servers. The client would connect to the proxy server and request services, the proxy server determines the validity then allows or denies it. The web filter will prevent users’ browsers from loading pages of certain websites. Our antivirus software will use a multitude of ways to determine if software is malicious. Existing malware signatures is the most popular way the antivirus software can detect malicious code. Antivirus scanners collect the signatures into a database that helps McAfee stay up to date.
Security Trails. October 16, 2018. [Top 10 Common Network Security Threats Explained]. Visited: September 11, 2019. https://securitytrails.com/blog/top-10-common-network-security-threats-explained
Healthcare IT. July 24, 2019. [SolarWinds]. Visited: September 13, 2019. https://www.secure-24.com/five-steps-to-developing-a-healthcare-information-technology-security-plan/
Melnick, Jeff. January 22, 2019. [Need to Know About]. Visited: September 14, 2019. https://blog.netwrix.com/2019/01/22/network-security-devices-you-need-to-know-about/
Hutter, David. 2019. [Physical Security and Why It Is Important]. SANS Institute 2019.